First published: Wed Sep 22 2021(Updated: )
A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-pktleak-dos-uSTyGrL
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controller Software | =8.10<8.10.162.01 | 8.10.162.01 |
Cisco Catalyst 9800 Wireless Controller Software | >=17.2<=17.3<IOS XE Access Point Service Pack 17.03.04.CSCvz178682 | IOS XE Access Point Service Pack 17.03.04.CSCvz178682 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Aironet Access Points vulnerability is cisco-sa-airo-wpa-pktleak-dos-uSTyGrL.
The severity rating of the Cisco Aironet Access Points WLAN Control Protocol Packet Buffer Leak Denial of Service vulnerability is high, with a severity value of 7.4.
This vulnerability could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition.
The affected versions of the Cisco Aironet Access Points software are 8.10 up to but excluding 8.10.162.01 for Wireless LAN Controller Software, and 17.2 up to and including 17.3 for Catalyst 9800 Wireless Controller Software.
You can find more information about this Cisco Aironet Access Points vulnerability at the following reference link: [link](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-pktleak-dos-uSTyGrL)