7.4
CVSSv3

CVE-2020-3552

Published: 24/09/2020 Updated: 16/04/2021
CVSS v2 Base Score: 6.1 | Impact Score: 6.9 | Exploitability Score: 6.5
CVSS v3 Base Score: 7.4 | Impact Score: 4 | Exploitability Score: 2.8
VMScore: 543
Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

A vulnerability in the Ethernet packet handling of Cisco Aironet Access Points (APs) Software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting as a wired client to the Ethernet interface of an affected device and sending a series of specific packets within a short time frame. A successful exploit could allow the malicious user to cause a NULL pointer access that results in a reload of the affected device.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco wireless_lan_controller

cisco business access points

cisco access_points

cisco aironet_access_point_software 8.10\\(1.255\\)

Vendor Advisories

A vulnerability in the Ethernet packet handling of Cisco Aironet Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device The vulnerability is due to insufficient input validation An attacker could exploit this vulnerability by connecting as a wired client t ...