It is possible to cause a denial-of-service attack if Cisco Aironet products have Telnet access enabled. Telnet access is the only requirement for such an attack; there are no additional conditions. The workaround for this vulnerability is to disable Telnet access. No other Cisco product is vulnerable. This advisory is available at http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20020409-aironet-telnet.
It is possible to cause a denial-of-service attack if Cisco Aironet products have Telnet access enabled. Telnet access is the only requirement for such an attack; there are no additional conditions.
The workaround for this vulnerability is to disable Telnet access.
No other Cisco product is vulnerable.
This advisory is available at http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20020409-aironet-telnet.
This section provides details on affected products.
All releases up to, but excluding, 11.21 are vulnerable. The following hardware products are affected.
Products not affected are:
No other Cisco products are currently known to be affected by these vulnerabilities.
This vulnerability is documented as Cisco Bug ID CSCdw81244.
It is possible to cause Cisco Aironet products to reboot if Telnet access is enabled and a password is required for authorization. This can be accomplished by providing an invalid username and password. This vulnerability cannot be triggered via the web interface.
The workaround is to disable Telnet access. You can accomplish this by following the link, via the web interface, path to reach the Console/Telnet Setup page:
Note: You must use the web interface or be connected on the console since you will be unable to save your changes if you are using Telnet. After disabling Telnet, your Telnet session will be terminated.
This vulnerability is fixed in release 11.21, which is available now.
This issue was reported to Cisco by a customer. Cisco PSIRT is not aware of any malicious exploitation or public discussion of this vulnerability.
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Revision 1.0 |
2002-April-09 |
Initial Public Release |
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.