Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco aironet access point software vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2024-20354
A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to incomplete cleanup of...
4.7
CVSSv3
CVE-2023-20268
A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent malicious user to exhaust resources on an affected device. This vulnerability is due to insufficient management of resources when handling certain t...
Cisco Wireless Lan Controller Software
Cisco Catalyst 9800 Embedded Wireless Controller Firmware
Cisco Business 150ax Firmware
Cisco Business 151axm Firmware
6.7
CVSSv3
CVE-2023-20097
A vulnerability in Cisco access points (AP) software could allow an authenticated, local malicious user to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controlle...
Cisco Wireless Lan Controller Software
Cisco Aironet Access Point Software
Cisco Ios Xe
5.5
CVSSv3
CVE-2023-20056
A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local malicious user to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the ...
Cisco Wireless Lan Controller Software
Cisco Aironet Access Point Software
Cisco Ios Xe
7.5
CVSSv3
CVE-2022-20622
A vulnerability in IP ingress packet processing of the Cisco Embedded Wireless Controller with Catalyst Access Points Software could allow an unauthenticated, remote malicious user to cause the device to reload unexpectedly, causing a denial of service (DoS) condition. The device...
Cisco Aironet Access Point Software
7.8
CVSSv3
CVE-2021-1419
A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations wi...
Cisco Aironet 1542d Firmware -
Cisco Aironet 1562d Firmware -
Cisco Aironet 1815m Firmware -
Cisco Aironet 1830e Firmware -
Cisco Aironet 1840i Firmware -
Cisco Aironet 1850e Firmware -
Cisco Aironet 2800i Firmware -
Cisco Aironet 3800p Firmware -
Cisco Aironet 4800 Firmware -
Cisco Catalyst 9105axi Firmware -
Cisco Catalyst 9115axe Firmware -
Cisco Catalyst 9117 Firmware -
Cisco Catalyst 9120axi Firmware -
Cisco Catalyst 9124axd Firmware -
Cisco Catalyst 9130axe Firmware -
Cisco Catalyst Iw6300 Ac Firmware -
Cisco Esw6300 Firmware -
Cisco 1100-8p Firmware -
Cisco 1120 Firmware -
Cisco 1160 Firmware -
Cisco Wireless Lan Controller Software
Cisco Catalyst 9800 Firmware
7.4
CVSSv3
CVE-2021-34740
A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent malicious user to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is ...
Cisco Aironet Access Point Software
Cisco Aironet Access Point Software 17.2
Cisco Aironet Access Point Software 17.3
3.5
CVSSv3
CVE-2020-24586
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that received fragments be cleared from memory after (re)connecting to a network. Under the right circumstances, when another device sends fragm...
Ieee Ieee 802.11
Debian Debian Linux 9.0
Linux Mac80211 -
Arista C-250 Firmware
Arista C-260 Firmware
Arista C-230 Firmware
Arista C-235 Firmware
Arista C-200 Firmware
Intel Ax210 Firmware
Intel Ax201 Firmware
Intel Ax200 Firmware
Intel Ac 9560 Firmware
Intel Ac 9462 Firmware
Intel Ac 9461 Firmware
Intel Ac 9260 Firmware
Intel Ac 8265 Firmware
Intel Ac 8260 Firmware
Intel Ac 3168 Firmware
Intel Ac 7265 Firmware
Intel Ac 3165 Firmware
Intel Ax1675 Firmware -
Intel Ax1650 Firmware -
2.6
CVSSv3
CVE-2020-24587
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that all fragments of a frame are encrypted under the same key. An adversary can abuse this to decrypt selected fragments when another device se...
Ieee Ieee 802.11
Linux Mac80211 -
Debian Debian Linux 9.0
Arista C-100 Firmware -
Arista C-110 Firmware -
Arista C-120 Firmware -
Arista C-130 Firmware -
Arista C-200 Firmware -
Arista C-230 Firmware -
Arista C-235 Firmware -
Arista C-250 Firmware -
Arista C-260 Firmware -
Arista C-65 Firmware -
Arista C-75 Firmware -
Arista O-105 Firmware -
Arista O-90 Firmware -
Arista W-118 Firmware -
Arista W-68 Firmware -
Cisco 1100 Firmware -
Cisco 1100-4p Firmware -
Cisco 1100-8p Firmware -
Cisco 1101-4p Firmware -
3.5
CVSSv3
CVE-2020-24588
The 802.11 standard that underpins Wi-Fi Protected Access (WPA, WPA2, and WPA3) and Wired Equivalent Privacy (WEP) doesn't require that the A-MSDU flag in the plaintext QoS header field is authenticated. Against devices that support receiving non-SSP A-MSDU frames (which is ...
Ieee Ieee 802.11
Linux Mac80211 -
Microsoft Windows Server 2008 R2
Microsoft Windows 10 1607
Microsoft Windows 8.1 -
Microsoft Windows Server 2016 -
Microsoft Windows Server 2008 -
Microsoft Windows 7 -
Microsoft Windows Rt 8.1 -
Microsoft Windows Server 2012 -
Microsoft Windows 10 -
Microsoft Windows 10 1803
Microsoft Windows Server 2019 -
Microsoft Windows 10 1809
Microsoft Windows 10 1909
Microsoft Windows 10 2004
Microsoft Windows Server 2016 2004
Microsoft Windows 10 20h2
Debian Debian Linux 9.0
Siemens Scalance W1748-1 Firmware -
Siemens Scalance W1750d Firmware -
Siemens Scalance W1788-1 Firmware -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »