Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
aireos vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv3
CVE-2016-1362
Cisco AireOS 4.1 up to and including 7.4.120.0, 7.5.x, and 7.6.100.0 on Wireless LAN Controller (WLC) devices allows remote malicious users to cause a denial of service (device reload) via a crafted HTTP request, aka Bug ID CSCun86747.
Cisco Aireos 7.5 Base
Cisco Aireos 4.1 Base
Cisco Aireos 7.6
Cisco Aireos 7.4
8.6
CVSSv3
CVE-2020-3492
A vulnerability in the Flexible NetFlow Version 9 packet processor of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers and Cisco AireOS Software for Cisco Wireless LAN Controllers (WLC) could allow an unauthenticated, remote malicious user to cause a deni...
Cisco Ios Xe 16.12.1
6.5
CVSSv3
CVE-2022-20769
A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error v...
Cisco Wireless Lan Controller Software
5.3
CVSSv3
CVE-2023-20251
A vulnerability in the memory buffer of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent malicious user to cause memory leaks that could eventually lead to a device reboot. This vulnerability is due to memory leaks caused by multiple cl...
Cisco Mobility Express Software -
7.8
CVSSv3
CVE-2021-1419
A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations wi...
Cisco Aironet 1542d Firmware -
Cisco Aironet 1562d Firmware -
Cisco Aironet 1815m Firmware -
Cisco Aironet 1830e Firmware -
Cisco Aironet 1840i Firmware -
Cisco Aironet 1850e Firmware -
Cisco Aironet 2800i Firmware -
Cisco Aironet 3800p Firmware -
Cisco Aironet 4800 Firmware -
Cisco Catalyst 9105axi Firmware -
Cisco Catalyst 9115axe Firmware -
Cisco Catalyst 9117 Firmware -
Cisco Catalyst 9120axi Firmware -
Cisco Catalyst 9124axd Firmware -
Cisco Catalyst 9130axe Firmware -
Cisco Catalyst Iw6300 Ac Firmware -
Cisco Esw6300 Firmware -
Cisco 1100-8p Firmware -
Cisco 1120 Firmware -
Cisco 1160 Firmware -
Cisco Wireless Lan Controller Software
Cisco Catalyst 9800 Firmware
5.3
CVSSv3
CVE-2017-13079
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 14.04
Redhat Enterprise Linux Server 7
Freebsd Freebsd 10
Freebsd Freebsd 10.4
Opensuse Leap 42.2
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 16.04
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd
Opensuse Leap 42.3
W1.fi Hostapd 2.4
W1.fi Hostapd 2.3
W1.fi Hostapd 0.6.10
W1.fi Hostapd 0.6.9
W1.fi Hostapd 0.4.11
W1.fi Hostapd 0.4.10
W1.fi Hostapd 0.4.9
W1.fi Hostapd 0.2.8
2 Articles
5.3
CVSSv3
CVE-2017-13081
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Debian Debian Linux 8.0
Freebsd Freebsd 11
Redhat Enterprise Linux Server 7
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd 10.4
Canonical Ubuntu Linux 17.04
Opensuse Leap 42.2
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Freebsd Freebsd 11.1
Freebsd Freebsd 10
Freebsd Freebsd
Opensuse Leap 42.3
W1.fi Hostapd 2.4
W1.fi Hostapd 2.3
W1.fi Hostapd 0.6.9
W1.fi Hostapd 0.6.8
W1.fi Hostapd 0.4.10
W1.fi Hostapd 0.4.9
W1.fi Hostapd 0.2.8
W1.fi Hostapd 0.2.6
2 Articles
6.8
CVSSv3
CVE-2017-13084
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 16.04
Freebsd Freebsd 10
Freebsd Freebsd 10.4
Opensuse Leap 42.3
Opensuse Leap 42.2
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 14.04
Redhat Enterprise Linux Server 7
W1.fi Hostapd 2.3
W1.fi Hostapd 2.2
W1.fi Hostapd 0.6.9
W1.fi Hostapd 0.6.8
W1.fi Hostapd 0.4.10
W1.fi Hostapd 0.4.9
W1.fi Hostapd 0.4.8
W1.fi Hostapd 0.2.6
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-26925
CVE-2023-41826
LFI
CVE-2022-22364
CVE-2024-2887
command injection
remote code execution
CVE-2024-34446
CVE-2022-48699
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started