First published: Wed Oct 16 2019(Updated: )
A vulnerability in the bridge protocol data unit (BPDU) forwarding functionality of Cisco Aironet Access Points (APs) could allow an unauthenticated, adjacent attacker to cause an AP port to go into an error disabled state. The vulnerability occurs because BPDUs received from specific wireless clients are forwarded incorrectly. An attacker could exploit this vulnerability on the wireless network by sending a steady stream of crafted BPDU frames. A successful exploit could allow the attacker to cause a limited denial of service (DoS) attack because an AP port could go offline. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-airo-dos
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Access Points |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20191016-airo-dos is rated as high due to the potential for an unauthenticated attack leading to service disruption.
To fix cisco-sa-20191016-airo-dos, apply the recommended software updates provided by Cisco for the affected Aironet Access Points.
The impact of cisco-sa-20191016-airo-dos includes the possibility of access points entering an error disabled state, leading to loss of connectivity.
Cisco Aironet Access Point devices that utilize BPDU forwarding functionality are affected by cisco-sa-20191016-airo-dos.
Currently, Cisco advises applying the software updates as the primary mitigative measure for cisco-sa-20191016-airo-dos.