First published: Wed Mar 24 2021(Updated: )
A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of incoming mDNS traffic. An attacker could exploit this vulnerability by sending a crafted mDNS packet to an affected device through a wireless network that is configured in FlexConnect local switching mode or through a wired network on a configured mDNS VLAN. A successful exploit could allow the attacker to cause the access point (AP) to reboot, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Aironet Access Point Software | ||
Cisco 1100 Integrated Services Router | ||
Cisco Aironet 1540 | ||
Cisco Aironet 1560 | ||
Cisco Aironet 1800 | ||
Cisco Aironet 2800 | ||
Cisco Aironet 3800 | ||
Cisco Aironet 4800 | ||
Cisco Catalyst 9100 | ||
Cisco Catalyst Iw6300 | ||
Cisco Esw6300 | ||
Cisco Catalyst 9800 Firmware | >=17.1<17.3.3 | |
Cisco Catalyst 9800 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1439.
The severity of CVE-2021-1439 is high with a score of 7.4.
The affected software for CVE-2021-1439 is Cisco Aironet Series Access Points Software.
The impact of CVE-2021-1439 is a denial of service (DoS) condition on an affected device.
To fix CVE-2021-1439, it is recommended to apply the necessary updates or patches provided by Cisco.