First published: Thu Sep 24 2020(Updated: )
A vulnerability in the Ethernet packet handling of Cisco Aironet Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting as a wired client to the Ethernet interface of an affected device and sending a series of specific packets within a short time frame. A successful exploit could allow the attacker to cause a NULL pointer access that results in a reload of the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ethport-dos-xtjTt8pY
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controllers | =8.8 - 8.9<8.10.105.0 | 8.10.105.0 |
Cisco Catalyst 9800 Series Wireless Controllers | =16.12 and earlier<16.12.2s | 16.12.2s |
Cisco Business AP Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ap-ethport-dos-xtjTt8pY is classified as a denial of service (DoS) vulnerability.
To fix cisco-sa-ap-ethport-dos-xtjTt8pY, update to the recommended software versions provided by Cisco.
cisco-sa-ap-ethport-dos-xtjTt8pY affects certain versions of Cisco Wireless LAN Controllers and Catalyst 9800 Wireless Controllers.
cisco-sa-ap-ethport-dos-xtjTt8pY requires an adjacent attacker, meaning it cannot be exploited remotely.
The cause of cisco-sa-ap-ethport-dos-xtjTt8pY is insufficient input validation in the Ethernet packet handling of affected Cisco devices.