First published: Wed Apr 15 2020(Updated: )
A vulnerability in Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper processing of client packets that are sent to an affected access point (AP). An attacker could exploit this vulnerability by sending a large number of sustained client packets to the affected AP. A successful exploit could allow the attacker to cause the affected AP to crash, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Aironet 1542i Firmware | =8.9\(100.0\) | |
Cisco Aironet 1542i | ||
Cisco Aironet 1542d Firmware | =8.9\(100.0\) | |
Cisco Aironet 1542d | ||
Cisco Aironet 1815 Firmware | =8.9\(100.0\) | |
Cisco Aironet 1815 | ||
Cisco Aironet 1830 Firmware | =8.9\(100.0\) | |
Cisco Aironet 1830 | ||
Cisco Aironet 1840 Firmware | =8.9\(100.0\) | |
Cisco Aironet 1840 | ||
Cisco Aironet 1850 Firmware | =8.9\(100.0\) | |
Cisco Aironet 1850 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3260 is a vulnerability in Cisco Aironet Series Access Points Software that could allow an unauthenticated adjacent attacker to cause a denial of service (DoS) condition on an affected device.
The severity of CVE-2020-3260 is high with a CVSS score of 6.5.
Cisco Aironet Series Access Points Software version 8.9(100.0) is affected.
An attacker can exploit CVE-2020-3260 by sending malicious client packets to an affected access point (AP) without authentication, causing a denial of service (DoS) condition.
Yes, Cisco has released a security advisory with mitigations and software updates to address CVE-2020-3260. Please refer to the provided reference for more information.