First published: Thu Sep 24 2020(Updated: )
A vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect parsing of HTTP packets while performing HTTP-based endpoint device classifications. An attacker could exploit this vulnerability by sending a crafted HTTP packet to an affected device. A successful exploit could cause an affected device to reboot, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | ||
Cisco 1100 Series Integrated Services Router | ||
Cisco 1101 Integrated Services Router | ||
Cisco 1109 Integrated Services Router | ||
Cisco 111x Integrated Services Router | ||
Cisco 111x Integrated Services Router | ||
Cisco 1120 Integrated Services Router | ||
Cisco 1160 Integrated Services Router | ||
Cisco 4221 Integrated Services Router | ||
Cisco 4321/k9 Integrated Services Router | ||
Cisco 4331/k9-rf Integrated Services Router | ||
Cisco 4351/k9-rf Integrated Services Router | ||
Cisco 4431 Integrated Services Router | ||
Cisco 4451-X Integrated Services Router | ||
Cisco 4441 Integrated Services Router | ||
Cisco ASR 1001 | ||
Cisco ASR 1001-X | ||
Cisco ASR 1002 Fixed Router | ||
Cisco ASR 1002-X | ||
Cisco ASR 1004 | ||
Cisco ASR 1006 | ||
Cisco ASR 1006-X | ||
Cisco ASR 1009-X | ||
Cisco ASR 1013 | ||
Cisco Catalyst 9800-40 | ||
Cisco Catalyst 9800-80 | ||
Cisco Catalyst 9800-CL | ||
Cisco Catalyst 9800-L | ||
Cisco Catalyst 9800-L | ||
Cisco Catalyst 9800-L | ||
Cisco Catalyst C9200 | ||
Cisco Catalyst 9200 Series | ||
Cisco Catalyst C9200-48P | ||
Cisco Catalyst 9200 Series | ||
Cisco Catalyst C9200L-24P-4G | ||
Cisco Catalyst C9200L-24P-4X | ||
Cisco Catalyst C9200L-24PXG-2Y | ||
Cisco Catalyst C9200L-24PXG-4X | ||
Cisco Catalyst C9200L-24T-4G | ||
Cisco Catalyst C9200L-24T-4X | ||
Cisco Catalyst C9200L-48P-4G | ||
Cisco Catalyst C9300-24P | ||
Cisco Catalyst C9300 | ||
Cisco Catalyst 9300-24T-A | ||
Cisco Catalyst C9300-24U | ||
Cisco Catalyst 9300-24UX | ||
Cisco Catalyst C9300-48P | ||
Cisco Catalyst C9300 | ||
Cisco Catalyst C9300 | ||
Cisco Catalyst 9300-48U | ||
Cisco Catalyst C9300 Series | ||
Cisco Catalyst C9300-48UXM | ||
Cisco Catalyst C9300 | ||
Cisco Catalyst C9300L-24P-4X | ||
Cisco Catalyst 9300L-24T-4G | ||
Cisco Catalyst 9300 | ||
Cisco Catalyst C9300L-48P-4G | ||
Cisco Catalyst 9300 Series Switches | ||
Cisco Catalyst C9300 | ||
Cisco Catalyst C9300L-48T-4X | ||
Cisco Catalyst C9404R | ||
Cisco Catalyst 9407R | ||
Cisco Catalyst 9410R | ||
Cisco Catalyst 9500 | ||
Cisco Catalyst 9500 | ||
Cisco Catalyst 9500 | ||
Cisco Catalyst C9500-24Y4C | ||
Cisco Catalyst 9500 | ||
Cisco Catalyst C9500-32QC | ||
Cisco Catalyst C9500-40x | ||
Cisco Catalyst C9500-48Y4C | ||
Cisco Catalyst 9600 | ||
Cisco Cloud Services Router 1000V | ||
Cisco Integrated Services Virtual Router Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability in the WLAN Local Profiling feature of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.
The severity of CVE-2020-3428 vulnerability is rated as high with a CVSS score of 6.5.
Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family is affected by CVE-2020-3428 vulnerability.
No, the Cisco 1100 Integrated Services Router is not vulnerable to CVE-2020-3428.
You can find more information about CVE-2020-3428 vulnerability on the Cisco Security Advisory page.