First published: Thu Sep 24 2020(Updated: )
Multiple vulnerabilities in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition of an affected device. These vulnerabilities are due to insufficient validation of CAPWAP packets. An attacker could exploit these vulnerabilities by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition on the affected device. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-capwap-dos-TPdNTdyq This advisory is part of the September 24, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 34 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: These vulnerabilities were found during internal security testing.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | ||
Cisco IOS XE Software for Catalyst 9800 Series Wireless Controllers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of cisco-sa-capwap-dos-TPdNTdyq is classified as high due to its potential to cause denial of service conditions.
To fix cisco-sa-capwap-dos-TPdNTdyq, update your Cisco IOS XE Software and Cisco Catalyst 9800 Series Wireless Controllers to the latest available version.
The cisco-sa-capwap-dos-TPdNTdyq vulnerability is caused by improper handling of the CAPWAP protocol processing.
Organizations using Cisco IOS XE Software and Cisco Catalyst 9800 Series Wireless Controllers are affected by cisco-sa-capwap-dos-TPdNTdyq.
Yes, cisco-sa-capwap-dos-TPdNTdyq can be exploited by an unauthenticated, adjacent attacker to launch a denial of service attack.