First published: Thu Sep 23 2021(Updated: )
A vulnerability in the packet processing functionality of Cisco Embedded Wireless Controller (EWC) Software for Catalyst Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected AP. This vulnerability is due to insufficient buffer allocation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to exhaust available resources and cause a DoS condition on an affected AP, as well as a DoS condition for client traffic traversing the AP.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Embedded Wireless Controller | <=17.6.1 | |
Cisco Catalyst 9105 | ||
Cisco Catalyst 9115 | ||
Cisco Catalyst 9117 | ||
Cisco Catalyst 9120 | ||
Cisco Catalyst 9124 | ||
Cisco Catalyst 9130 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1615.
The severity of CVE-2021-1615 is high with a CVSS score of 8.6.
CVE-2021-1615 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected AP.
Cisco Embedded Wireless Controller (EWC) Software version 17.6.1 is affected by CVE-2021-1615.
You can find more information about CVE-2021-1615 in the Cisco Security Advisory at https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-ewc-dos-g6JruHRT.