First published: Thu Sep 24 2020(Updated: )
A vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect parsing of HTTP packets while performing HTTP-based endpoint device classifications. An attacker could exploit this vulnerability by sending a crafted HTTP packet to an affected device. A successful exploit could cause an affected device to reboot, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | ||
Cisco 1100 Integrated Services Router | ||
Cisco 1101 Integrated Services Router | ||
Cisco 1109 Integrated Services Router | ||
Cisco 1111x Integrated Services Router | ||
Cisco 111x Integrated Services Router | ||
Cisco 1120 Integrated Services Router | ||
Cisco 1160 Integrated Services Router | ||
Cisco 4221 Integrated Services Router | ||
Cisco 4321 Integrated Services Router | ||
Cisco 4331 Integrated Services Router | ||
Cisco 4351 Integrated Services Router | ||
Cisco 4431 Integrated Services Router | ||
Cisco 4451-x Integrated Services Router | ||
Cisco 4461 Integrated Services Router | ||
Cisco Asr 1001-hx | ||
Cisco Asr 1001-x | ||
Cisco Asr 1002-hx | ||
Cisco Asr 1002-x | ||
Cisco Asr 1004 | ||
Cisco Asr 1006 | ||
Cisco Asr 1006-x | ||
Cisco Asr 1009-x | ||
Cisco Asr 1013 | ||
Cisco Catalyst 9800-40 | ||
Cisco Catalyst 9800-80 | ||
Cisco Catalyst 9800-cl | ||
Cisco Catalyst 9800-l | ||
Cisco Catalyst 9800-l-c | ||
Cisco Catalyst 9800-l-f | ||
Cisco Catalyst C9200-24p | ||
Cisco Catalyst C9200-24t | ||
Cisco Catalyst C9200-48p | ||
Cisco Catalyst C9200-48t | ||
Cisco Catalyst C9200l-24p-4g | ||
Cisco Catalyst C9200l-24p-4x | ||
Cisco Catalyst C9200l-24pxg-2y | ||
Cisco Catalyst C9200l-24pxg-4x | ||
Cisco Catalyst C9200l-24t-4g | ||
Cisco Catalyst C9200l-24t-4x | ||
Cisco Catalyst C9200l-48p-4g | ||
Cisco Catalyst C9300-24p | ||
Cisco Catalyst C9300-24s | ||
Cisco Catalyst C9300-24t | ||
Cisco Catalyst C9300-24u | ||
Cisco Catalyst C9300-24ux | ||
Cisco Catalyst C9300-48p | ||
Cisco Catalyst C9300-48s | ||
Cisco Catalyst C9300-48t | ||
Cisco Catalyst C9300-48u | ||
Cisco Catalyst C9300-48un | ||
Cisco Catalyst C9300-48uxm | ||
Cisco Catalyst C9300l-24p-4g | ||
Cisco Catalyst C9300l-24p-4x | ||
Cisco Catalyst C9300l-24t-4g | ||
Cisco Catalyst C9300l-24t-4x | ||
Cisco Catalyst C9300l-48p-4g | ||
Cisco Catalyst C9300l-48p-4x | ||
Cisco Catalyst C9300l-48t-4g | ||
Cisco Catalyst C9300l-48t-4x | ||
Cisco Catalyst C9404r | ||
Cisco Catalyst C9407r | ||
Cisco Catalyst C9410r | ||
Cisco Catalyst C9500-12q | ||
Cisco Catalyst C9500-16x | ||
Cisco Catalyst C9500-24q | ||
Cisco Catalyst C9500-24y4c | ||
Cisco Catalyst C9500-32c | ||
Cisco Catalyst C9500-32qc | ||
Cisco Catalyst C9500-40x | ||
Cisco Catalyst C9500-48y4c | ||
Cisco Catalyst C9600 Switch | ||
Cisco Cloud Services Router 1000v | ||
Cisco Integrated Services Virtual Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.
The severity of CVE-2020-3428 vulnerability is rated as high with a CVSS score of 6.5.
Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family is affected by CVE-2020-3428 vulnerability.
No, the Cisco 1100 Integrated Services Router is not vulnerable to CVE-2020-3428.
You can find more information about CVE-2020-3428 vulnerability on the Cisco Security Advisory page.