First published: Thu Jan 26 2017(Updated: )
A Denial of Service Vulnerability in 802.11 ingress connection authentication handling for the Cisco Mobility Express 2800 and 3800 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause authentication to fail. Affected Products: This vulnerability affects Cisco Mobility Express 2800 Series and 3800 Series Access Points when configured in local mode in 40 MHz. More Information: CSCvb33575. Known Affected Releases: 8.2(121.12) 8.4(1.82). Known Fixed Releases: 8.2(131.2) 8.2(131.3) 8.2(131.4) 8.2(141.0) 8.3(104.53) 8.3(104.54) 8.4(1.80) 8.4(1.85).
Credit: ykramarz@cisco.com psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Access Point Software | =8.2\(121.12\) | |
Cisco Access Point Software | =8.4\(1.82\) | |
=8.2\(121.12\) | ||
=8.4\(1.82\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-9221 has been rated as a high severity vulnerability due to its potential to cause a denial of service.
To mitigate CVE-2016-9221, users should update their Cisco Mobility Express 2800 and 3800 Access Points to the latest software version available.
CVE-2016-9221 affects users of Cisco Mobility Express 2800 and 3800 Access Points running specific versions of Cisco Access Point Software.
CVE-2016-9221 requires an adjacent attacker to exploit the vulnerability, meaning that remote exploitation is not possible.
Exploitation of CVE-2016-9221 can lead to denial of service, preventing legitimate users from authenticating to the affected access points.