Vulnerabilites related to cisco - aironet_3700e
Vulnerability from fkie_nvd
Published
2019-07-17 21:15
Modified
2024-11-21 04:37
Summary
A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling condition for client authentication requests sent to a targeted interface configured for FT. An attacker could exploit this vulnerability by sending crafted authentication request traffic to the targeted interface, causing the device to restart unexpectedly.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3700e_firmware:15.3\\(3\\)jc14:*:*:*:*:*:*:*",
              "matchCriteriaId": "50537263-6F02-4AB0-8E1F-9E18D256C7F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3700e_firmware:15.3\\(3\\)jd6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C347FB0C-6FFA-40F5-9D0A-47189DB545D9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3700e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB8E4C40-6015-4C63-AA60-3DB220AC6810",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3700i_firmware:15.3\\(3\\)jc14:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CAED89B-682A-4173-853D-A09DCB287FCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3700i_firmware:15.3\\(3\\)jd6:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE896F4-37B6-4D44-90D2-048F03C23E54",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3700i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45FDCF87-A36B-4CED-9815-A9A173729B3A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3700p_firmware:15.3\\(3\\)jc14:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCC8A3B3-FCE6-4D21-B8DE-CBC33807CC39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:aironet_3700p_firmware:15.3\\(3\\)jd6:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E7C5F2D-AB6F-433C-97E9-69A0984C6C3A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3700p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE71E9F-BCFE-4F02-9440-3714445CF6D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:access_points:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B5E2D9-426A-409F-9399-2776D1797F34",
              "versionEndExcluding": "8.2.170.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:access_points:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59416D53-ED7F-4A1F-AAC0-0AEF1727B0BB",
              "versionEndExcluding": "8.3.150.0",
              "versionStartIncluding": "8.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:access_points:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D69E00-162B-4399-9FE8-F5247F15F2ED",
              "versionEndExcluding": "8.5.131.0",
              "versionStartIncluding": "8.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:access_points:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B218A1C-623C-44F5-8A00-DCB5592DA38F",
              "versionEndExcluding": "8.8.100.0",
              "versionStartIncluding": "8.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling condition for client authentication requests sent to a targeted interface configured for FT. An attacker could exploit this vulnerability by sending crafted authentication request traffic to the targeted interface, causing the device to restart unexpectedly."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la implementaci\u00f3n de 802.11r Fast Transition (FT) para el Software IOS Access Points (APs) de Cisco, podr\u00eda permitir a un atacante adyacente no autenticado causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en una interfaz afectada. La vulnerabilidad es debido a la falta de una condici\u00f3n de manejo de errores completo para las peticiones de autenticaci\u00f3n de clientes enviadas hacia una interfaz espec\u00edfica configurada para FT. Un atacante podr\u00eda explotar esta vulnerabilidad mediante un env\u00edo de tr\u00e1fico de petici\u00f3n de autenticaci\u00f3n hacia la interfaz de destino, haciendo que el dispositivo se reinicie inesperadamente."
    }
  ],
  "id": "CVE-2019-1920",
  "lastModified": "2024-11-21T04:37:41.320",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 4.0,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-07-17T21:15:12.093",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/109312"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-aironet-dos"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/109312"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-aironet-dos"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-03-27 17:15
Modified
2025-08-13 17:18
Summary
A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E1EA626-452F-4B1D-9DFA-1DFC2C948EB3",
              "versionEndExcluding": "8.6.0.0",
              "versionStartIncluding": "8.5.171.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D12A362-FA6B-4505-92DC-4F2072B22DB5",
              "versionEndExcluding": "8.10.190.81",
              "versionStartIncluding": "8.10.130.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1530e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3FF0BCA-4904-43B2-94F9-2B5A6A996096",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1530i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17020D8A-4ABE-4C5C-A1BE-945C4A9E92DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1552s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E891D9-6F4E-4719-ADA2-5128ECEAA9EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1552wu:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFF6AF41-47AC-41F4-93CE-7E2BA59F3364",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1700i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7755B1F0-A7EB-482A-9E40-25F6DACFA63A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2700e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2C4F66-F6B5-4901-9BCE-87A4856D4C34",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2700i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8010EB74-E5F8-41E0-84D0-A0F21793747C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3700e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB8E4C40-6015-4C63-AA60-3DB220AC6810",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3700i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45FDCF87-A36B-4CED-9815-A9A173729B3A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3700p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE71E9F-BCFE-4F02-9440-3714445CF6D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ap801:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91F8624-B006-44E4-8767-339E96DE8BDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ap802:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E49EFA9-3D86-491E-8854-826861512925",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ap803:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD61BE4C-8C2E-4087-9B03-D5788CCCCF16",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:iw3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9919E498-C454-4CEA-A393-19118F4B1589",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9643FDBC-697D-4F87-87F2-5B784833EEBC",
              "versionEndExcluding": "17.1.0",
              "versionStartIncluding": "16.12.4a",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36DD09BF-ED3C-46EB-86BA-0D70C66ED6EE",
              "versionEndExcluding": "17.3.9",
              "versionStartIncluding": "17.3.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AB9DF30-8950-4826-8458-800ED5112A6A",
              "versionEndExcluding": "17.6.7",
              "versionStartIncluding": "17.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59F62008-2AC3-455E-8EFF-42E42CFCE016",
              "versionEndExcluding": "17.9.5",
              "versionStartIncluding": "17.7.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61B9ED9E-E9D7-4AA4-9C4D-D564B1F871BF",
              "versionEndExcluding": "17.12.2",
              "versionStartIncluding": "17.10.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1530e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3FF0BCA-4904-43B2-94F9-2B5A6A996096",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1530i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17020D8A-4ABE-4C5C-A1BE-945C4A9E92DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1552h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BA6C6D9-9980-4EE7-9A7D-02D5D34DE878",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1552s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1E891D9-6F4E-4719-ADA2-5128ECEAA9EB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1552wu:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFF6AF41-47AC-41F4-93CE-7E2BA59F3364",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1700i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7755B1F0-A7EB-482A-9E40-25F6DACFA63A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2700e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA2C4F66-F6B5-4901-9BCE-87A4856D4C34",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_2700i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8010EB74-E5F8-41E0-84D0-A0F21793747C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3700e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB8E4C40-6015-4C63-AA60-3DB220AC6810",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3700i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45FDCF87-A36B-4CED-9815-A9A173729B3A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3700p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCE71E9F-BCFE-4F02-9440-3714445CF6D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ap801:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A91F8624-B006-44E4-8767-339E96DE8BDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ap802:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E49EFA9-3D86-491E-8854-826861512925",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:ap803:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD61BE4C-8C2E-4087-9B03-D5788CCCCF16",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:iw3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9919E498-C454-4CEA-A393-19118F4B1589",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device.\r\n\r This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el manejo de tramas inal\u00e1mbricas cifradas del software Cisco Aironet Access Point (AP) podr\u00eda permitir que un atacante adyacente no autenticado cause una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en el dispositivo afectado. Esta vulnerabilidad se debe a una limpieza incompleta de recursos al eliminar ciertos marcos con formato incorrecto. Un atacante podr\u00eda aprovechar esta vulnerabilidad conect\u00e1ndose como cliente inal\u00e1mbrico a un AP afectado y enviando tramas espec\u00edficas con formato incorrecto a trav\u00e9s de la conexi\u00f3n inal\u00e1mbrica. Un exploit exitoso podr\u00eda permitir que el atacante cause una degradaci\u00f3n del servicio a otros clientes, lo que potencialmente podr\u00eda conducir a una condici\u00f3n DoS completa."
    }
  ],
  "id": "CVE-2024-20354",
  "lastModified": "2025-08-13T17:18:10.143",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-03-27T17:15:53.660",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-460"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    }
  ]
}

CVE-2024-20354 (GCVE-0-2024-20354)
Vulnerability from cvelistv5
Published
2024-03-27 16:47
Modified
2024-08-01 21:59
CWE
  • CWE-460 - Improper Cleanup on Thrown Exception
Summary
A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20354",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-18T22:49:23.614193Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-23T18:28:01.520Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:59:41.707Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-airo-ap-dos-PPPtcVW",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Aironet Access Point Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        },
        {
          "product": "Cisco Aironet Access Point Software (IOS XE Controller)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device.\r\n\r This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-460",
              "description": "Improper Cleanup on Thrown Exception",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-27T16:47:04.924Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-airo-ap-dos-PPPtcVW",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW"
        }
      ],
      "source": {
        "advisory": "cisco-sa-airo-ap-dos-PPPtcVW",
        "defects": [
          "CSCwh81027"
        ],
        "discovery": "EXTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20354",
    "datePublished": "2024-03-27T16:47:04.924Z",
    "dateReserved": "2023-11-08T15:08:07.647Z",
    "dateUpdated": "2024-08-01T21:59:41.707Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-1920 (GCVE-0-2019-1920)
Vulnerability from cvelistv5
Published
2019-07-17 20:20
Modified
2024-11-21 19:19
CWE
Summary
A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling condition for client authentication requests sent to a targeted interface configured for FT. An attacker could exploit this vulnerability by sending crafted authentication request traffic to the targeted interface, causing the device to restart unexpectedly.
Impacted products
Vendor Product Version
Cisco Cisco Aironet Access Point Software Version: unspecified   < 8.8.100.0
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T18:35:51.296Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20190717 Cisco IOS Access Points Software 802.11r Fast Transition Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-aironet-dos"
          },
          {
            "name": "109312",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/109312"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2019-1920",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-21T18:57:49.368036Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-21T19:19:08.762Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Aironet Access Point Software",
          "vendor": "Cisco",
          "versions": [
            {
              "lessThan": "8.8.100.0",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2019-07-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling condition for client authentication requests sent to a targeted interface configured for FT. An attacker could exploit this vulnerability by sending crafted authentication request traffic to the targeted interface, causing the device to restart unexpectedly."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-07-22T12:06:04",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20190717 Cisco IOS Access Points Software 802.11r Fast Transition Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-aironet-dos"
        },
        {
          "name": "109312",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/109312"
        }
      ],
      "source": {
        "advisory": "cisco-sa-20190717-aironet-dos",
        "defect": [
          [
            "CSCvg95745"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco IOS Access Points Software 802.11r Fast Transition Denial of Service Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2019-07-17T16:00:00-0700",
          "ID": "CVE-2019-1920",
          "STATE": "PUBLIC",
          "TITLE": "Cisco IOS Access Points Software 802.11r Fast Transition Denial of Service Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Aironet Access Point Software",
                      "version": {
                        "version_data": [
                          {
                            "affected": "\u003c",
                            "version_affected": "\u003c",
                            "version_value": "8.8.100.0"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling condition for client authentication requests sent to a targeted interface configured for FT. An attacker could exploit this vulnerability by sending crafted authentication request traffic to the targeted interface, causing the device to restart unexpectedly."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "7.4",
            "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20190717 Cisco IOS Access Points Software 802.11r Fast Transition Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190717-aironet-dos"
            },
            {
              "name": "109312",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/109312"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-20190717-aironet-dos",
          "defect": [
            [
              "CSCvg95745"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2019-1920",
    "datePublished": "2019-07-17T20:20:13.229582Z",
    "dateReserved": "2018-12-06T00:00:00",
    "dateUpdated": "2024-11-21T19:19:08.762Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}