First published: Wed Jun 03 2020(Updated: )
A vulnerability in the handling of IEEE 802.11w Protected Management Frames (PMFs) of Cisco Catalyst 9800 Series Wireless Controllers that are running Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to terminate a valid user connection to an affected device. The vulnerability exists because the affected software does not properly validate 802.11w disassociation and deauthentication PMFs that it receives. An attacker could exploit this vulnerability by sending a spoofed 802.11w PMF from a valid, authenticated client on a network adjacent to an affected device. A successful exploit could allow the attacker to terminate a single valid user connection to the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =16.10.1 | |
Cisco IOS XE Web UI | =16.10.1e | |
Cisco IOS XE Web UI | =16.10.1s |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-dos-AnvKvMxR
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-3206 is considered high, due to its potential impact on user connection availability.
To fix CVE-2020-3206, upgrade to the appropriate version of Cisco IOS XE Software that addresses the vulnerability.
CVE-2020-3206 affects Cisco Catalyst 9800 Series Wireless Controllers running specific versions of Cisco IOS XE Software.
CVE-2020-3206 cannot be exploited remotely as it requires an adjacent attacker to terminate a valid user connection.
The impact of CVE-2020-3206 is the potential termination of valid user connections, which can lead to denial of service.