First published: Wed Oct 17 2018(Updated: )
A vulnerability in the 802.11r Fast Transition feature set of Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a corruption of certain timer mechanisms triggered by specific roaming events. This corruption will eventually cause a timer crash. An attacker could exploit this vulnerability by sending malicious reassociation events multiple times to the same AP in a short period of time, causing a DoS condition on the affected AP.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Access Points | =8.0\(140.0\) | |
Cisco Access Points | =8.2\(141.0\) | |
Cisco Access Points | =8.2\(151.0\) | |
Cisco Access Points | =8.3\(102.0\) | |
Cisco Access Points | =8.3\(112.0\) | |
Cisco Access Points | =8.3\(114.74\) | |
Cisco Access Points | =15.3\(3\)jd | |
Cisco Access Points | <8.3.140.0 | |
Cisco Access Points | >=8.4<8.5.110.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0441 is a vulnerability in the 802.11r Fast Transition feature set of Cisco IOS Access Points (APs) Software.
CVE-2018-0441 could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.
CVE-2018-0441 has a severity rating of 7.4, which is considered high.
Cisco has released security updates to address CVE-2018-0441. Apply the necessary patches as soon as possible.
You can find more information about CVE-2018-0441 on the Cisco Security Advisories website.