A vulnerability in the Ethernet packet handling of Cisco Aironet Access Points (APs) Software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting as a wired client to the Ethernet interface of an affected device and sending a series of specific packets within a short time frame. A successful exploit could allow the malicious user to cause a NULL pointer access that results in a reload of the affected device.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco wireless_lan_controller |
||
cisco business access points |
||
cisco access_points |
||
cisco aironet_access_point_software 8.10\\(1.255\\) |