First published: Sat Nov 15 2014(Updated: )
Cisco IOS on Aironet access points, when "dot11 aaa authenticator" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco Aironet 1040 | ||
Cisco Aironet 1140 | ||
Cisco Aironet 1260 | ||
Cisco Aironet 3500 | ||
Cisco Aironet 3600e | ||
Cisco Aironet 3600 | ||
Cisco Aironet 3600 | ||
Cisco Aironet 3600 | ||
Cisco Aironet 600 OfficeExtend | ||
Cisco Aironet AP1100 | ||
Cisco Aironet AP1130AG | ||
Cisco Aironet AP1131 | ||
Cisco Aironet AP1200 | ||
Cisco Aironet AP1230AG | ||
Cisco Aironet AP1240AG | ||
Cisco Aironet AP1240 | ||
Cisco Aironet AP1300 | ||
Cisco Aironet AP1400 | ||
Cisco Aironet AP340 | ||
Cisco Aironet AP340 | =11.21 | |
Cisco Aironet AP350 | ||
Cisco Aironet AP350 | =11.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-7998 has been classified as a denial of service vulnerability.
To fix CVE-2014-7998, disable the 'dot11 aaa authenticator' debugging feature on affected Cisco IOS devices.
CVE-2014-7998 affects Cisco IOS on Aironet access points when specific debugging is enabled.
Yes, CVE-2014-7998 can be exploited by remote attackers using malformed EAP packets.
The primary workaround for CVE-2014-7998 is to avoid enabling debugging for 'dot11 aaa authenticator'.