First published: Thu Sep 24 2020(Updated: )
A vulnerability in Cisco IOS XE Wireless Controller Software for Cisco Catalyst 9800 Series Routers could allow an unauthenticated, adjacent attacker to send ICMPv6 traffic prior to the client being placed into RUN state. The vulnerability is due to an incomplete access control list (ACL) being applied prior to RUN state. An attacker could exploit this vulnerability by connecting to the associated service set identifier (SSID) and sending ICMPv6 traffic. A successful exploit could allow the attacker to send ICMPv6 traffic prior to RUN state.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | =17.1.1 | |
Cisco Catalyst 9800-40 | ||
Cisco Catalyst 9800-80 | ||
Cisco Catalyst 9800-cl | ||
Cisco Catalyst 9800-l | ||
Cisco Catalyst 9800-l-c | ||
Cisco Catalyst 9800-l-f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3418 is a vulnerability in Cisco IOS XE Wireless Controller Software for Cisco Catalyst 9800 Series Routers.
The severity of CVE-2020-3418 is medium with a CVSS score of 4.7.
CVE-2020-3418 allows an unauthenticated, adjacent attacker to send ICMPv6 traffic prior to the client being placed into RUN state.
No, Cisco Catalyst 9800-40 is not affected by CVE-2020-3418.
To fix CVE-2020-3418, apply the necessary security patches or updates provided by Cisco.