Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
aironet access point software vulnerabilities and exploits
(subscribe to this query)
6
CVSSv2
CVE-2018-0226
A vulnerability in the assignment and management of default user accounts for Secure Shell (SSH) access to Cisco Aironet 1800, 2800, and 3800 Series Access Points that are running Cisco Mobility Express Software could allow an authenticated, remote malicious user to gain elevated...
Cisco Mobility Express Software 8.3\\(90.65\\)
Cisco Mobility Express Software 8.4\\(1.65\\)
6.8
CVSSv2
CVE-2016-1419
Cisco Access Point devices with software 8.2(102.43) allow remote malicious users to cause a denial of service (device reload) via crafted ARP packets, aka Bug ID CSCuy55803.
Cisco Aironet Access Point Software 8.2\\(102.43\\)
5
CVSSv2
CVE-2005-3482
Cisco 1200, 1131, and 1240 series Access Points, when operating in Lightweight Access Point Protocol (LWAPP) mode and controlled by 2000 and 4400 series Airespace WLAN controllers running 3.1.59.24, allow remote malicious users to send unencrypted traffic to a secure network usin...
Cisco Aironet Ap1200
Cisco Aironet Ap1240
Cisco Aironet Ap1131
5
CVSSv2
CVE-2021-1437
A vulnerability in the FlexConnect Upgrade feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, remote malicious user to obtain confidential information from an affected device. This vulnerability is due to an unrestricted Trivial File Transfer P...
Cisco Aironet Access Point Software -
Cisco Catalyst 9800 Firmware
Cisco Wireless Lan Controller Software
10
CVSSv2
CVE-2017-3834
A vulnerability in Cisco Aironet 1830 Series and Cisco Aironet 1850 Series Access Points running Cisco Mobility Express Software could allow an unauthenticated, remote malicious user to take complete control of an affected device. The vulnerability is due to the existence of defa...
Cisco Aironet Access Point Firmware 8.2.100.0
Cisco Aironet Access Point Firmware 8.2.102.43
Cisco Aironet Access Point Firmware 8.2.102.139
Cisco Aironet Access Point Firmware 8.2.111.0
Cisco Aironet Access Point Firmware 8.2.121.12
Cisco Aironet Access Point Firmware 8.2.130.0
Cisco Aironet Access Point Firmware 90.57
Cisco Aironet Access Point Firmware 102.0
7.8
CVSSv2
CVE-2020-3559
A vulnerability in Cisco Aironet Access Point (AP) Software could allow an unauthenticated, remote malicious user to cause an affected device to reload. The vulnerability is due to improper handling of clients that are trying to connect to the AP. An attacker could exploit this v...
Cisco Wireless Lan Controller
Cisco Business Access Points
Cisco Access Points
Cisco Aironet Access Point Software 8.5\\(151.0\\)
Cisco Aironet Access Point Software 17.2.0.26
6.1
CVSSv2
CVE-2014-7997
The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote malicious users to cause a denial of service (device restart) by triggering a transition into a r...
Cisco Ios -
3.3
CVSSv2
CVE-2021-1439
A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input v...
Cisco Aironet Access Point Software -
Cisco Catalyst 9800 Firmware
2.9
CVSSv2
CVE-2017-13079
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 14.04
Redhat Enterprise Linux Server 7
Freebsd Freebsd 10
Freebsd Freebsd 10.4
Opensuse Leap 42.2
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 16.04
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd
Opensuse Leap 42.3
W1.fi Hostapd 2.4
W1.fi Hostapd 2.3
W1.fi Hostapd 0.6.10
W1.fi Hostapd 0.6.9
W1.fi Hostapd 0.4.11
W1.fi Hostapd 0.4.10
W1.fi Hostapd 0.4.9
W1.fi Hostapd 0.2.8
2 Articles
2.9
CVSSv2
CVE-2017-13081
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Debian Debian Linux 8.0
Freebsd Freebsd 11
Redhat Enterprise Linux Server 7
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd 10.4
Canonical Ubuntu Linux 17.04
Opensuse Leap 42.2
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Freebsd Freebsd 11.1
Freebsd Freebsd 10
Freebsd Freebsd
Opensuse Leap 42.3
W1.fi Hostapd 2.4
W1.fi Hostapd 2.3
W1.fi Hostapd 0.6.9
W1.fi Hostapd 0.6.8
W1.fi Hostapd 0.4.10
W1.fi Hostapd 0.4.9
W1.fi Hostapd 0.2.8
W1.fi Hostapd 0.2.6
2 Articles
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »