First published: Tue Jul 23 2013(Updated: )
Cisco Aironet 3600 access points allow remote attackers to cause a denial of service (memory corruption and device crash) by disrupting Cisco Wireless LAN Controller communication and consequently forcing many transitions from FlexConnect mode to Standalone mode, aka Bug ID CSCuh71210.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Aironet 3600e | ||
Cisco Aironet 3600 | ||
Cisco Aironet 3600 | ||
Cisco Aironet 3600 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-3441 has a severity rating that indicates a high risk of denial of service attacks.
To mitigate CVE-2013-3441, it is recommended to update Cisco Aironet 3600 access points to the latest available firmware.
CVE-2013-3441 affects various models of Cisco Aironet 3600 access points including the 3600, 3600e, 3600i, and 3600p.
The impact of CVE-2013-3441 can cause memory corruption and crashes, resulting in a denial of service.
Currently, implementing security best practices and keeping the firmware updated are recommended workarounds for CVE-2013-3441.