Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco aironet access point software vulnerabilities and exploits
(subscribe to this query)
7.4
CVSSv3
CVE-2019-1920
A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of compl...
Cisco Aironet 3700e Firmware 15.3\\(3\\)jc14
Cisco Aironet 3700e Firmware 15.3\\(3\\)jd6
Cisco Aironet 3700i Firmware 15.3\\(3\\)jd6
Cisco Aironet 3700i Firmware 15.3\\(3\\)jc14
Cisco Aironet 3700p Firmware 15.3\\(3\\)jc14
Cisco Aironet 3700p Firmware 15.3\\(3\\)jd6
Cisco Access Points
7.4
CVSSv3
CVE-2021-1439
A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input v...
Cisco Aironet Access Point Software -
Cisco Catalyst 9800 Firmware
8.6
CVSSv3
CVE-2018-0252
A vulnerability in the IP Version 4 (IPv4) fragment reassembly function of Cisco 3500, 5500, and 8500 Series Wireless LAN Controller Software could allow an unauthenticated, remote malicious user to cause an affected device to reload unexpectedly, resulting in a denial of service...
Cisco Wireless Lan Controller Software 8.5\\(107.41\\)
Cisco Wireless Lan Controller Software 8.6\\(1.108\\)
Cisco Wireless Lan Controller Software 8.4\\(100.0\\)
Cisco Wireless Lan Controller Software 8.5\\(107.30\\)
NA
CVE-2012-6026
The HTTP Profiler on the Cisco Aironet Access Point with software 15.2 and previous versions does not properly manage buffers, which allows remote malicious users to cause a denial of service (device reload) via crafted HTTP requests, aka Bug ID CSCuc62460.
Cisco Aironet Access Point Software 7.3
Cisco Aironet Access Point Software 15.2
Cisco Aironet Access Point Software 12.4
Cisco Aironet Access Point Software 7.4
7.8
CVSSv3
CVE-2016-1418
Cisco Aironet Access Point Software 8.2(100.0) on 1830e, 1830i, 1850e, 1850i, 2800, and 3800 access points allows local users to obtain Linux root access via crafted CLI command parameters, aka Bug ID CSCuy64037.
Cisco Aironet Access Point Software 8.2 \\(100.0\\)
7.5
CVSSv3
CVE-2020-3273
A vulnerability in the 802.11 Generic Advertisement Service (GAS) frame processing function of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote malicious user to cause an affected device to reload, resulting in a denial of service (DoS). The vul...
Cisco 5508 Wireless Controller Firmware 8.5\\(151.0\\)
Cisco 5508 Wireless Controller Firmware 8.10\\(204.92\\)
Cisco 5520 Wireless Controller Firmware 8.5\\(151.0\\)
Cisco 5520 Wireless Controller Firmware 8.10\\(204.92\\)
5.3
CVSSv3
CVE-2020-26139
An issue exists in the kernel in NetBSD 7.1. An Access Point (AP) forwards EAPOL frames to other clients even though the sender has not yet successfully authenticated to the AP. This might be abused in projected Wi-Fi networks to launch denial-of-service attacks against connected...
Netbsd Netbsd 7.1
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
Cisco 1109-2p Firmware -
2.6
CVSSv3
CVE-2020-24587
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device se...
Ieee Ieee 802.11
Linux Mac80211 -
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
3.5
CVSSv3
CVE-2020-24588
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is ...
Ieee Ieee 802.11
Linux Mac80211 -
Microsoft Windows Server 2008 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows 10 1909
Microsoft Windows 10 2004
Microsoft Windows Server 2016 2004
Microsoft Windows 10 20h2
Debian Debian Linux 9.0
Siemens Scalance W1748-1 Firmware -
Siemens Scalance W1750d Firmware -
Siemens Scalance W1788-1 Firmware -
NA
CVE-2014-0703
Cisco Wireless LAN Controller (WLC) devices 7.4 prior to 7.4.110.0 distribute Aironet IOS software with a race condition in the status of the administrative HTTP server, which allows remote malicious users to bypass intended access restrictions by connecting to an Aironet access ...
Cisco Wireless Lan Controller Software 7.4.100.0
Cisco Wireless Lan Controller Software 7.4.100.60
Cisco Wireless Lan Controller
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2020-4463
CVE-2024-29895
inject
CVE-2023-52689
CVE-2024-5049
CVE-2024-5051
privilege escalation
physical
CVE-2023-52676
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »