A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the malicious user to cause an unexpected reload of an affected device, resulting in a DoS condition.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco business_150ax_firmware |
||
cisco business_151axm_firmware |
||
cisco catalyst_9105ax_firmware |
||
cisco catalyst_9105axi_firmware |
||
cisco catalyst_9105axw_firmware |
||
cisco catalyst_9105i_firmware |
||
cisco catalyst_9105w_firmware |
||
cisco catalyst_9115_firmware |
||
cisco catalyst_9115ax_firmware |
||
cisco catalyst_9115axe_firmware |
||
cisco catalyst_9115axi_firmware |
||
cisco catalyst_9117_firmware |
||
cisco catalyst_9117ax_firmware |
||
cisco catalyst_9117axi_firmware |
||
cisco catalyst_9120_firmware |
||
cisco catalyst_9120ax_firmware |
||
cisco catalyst_9120axe_firmware |
||
cisco catalyst_9120axi_firmware |
||
cisco catalyst_9120axp_firmware |
||
cisco catalyst_9124_firmware |
||
cisco catalyst_9124ax_firmware |
||
cisco catalyst_9124axd_firmware |
||
cisco catalyst_9124axi_firmware |
||
cisco catalyst_9130_firmware |
||
cisco catalyst_9130ax_firmware |
||
cisco catalyst_9130axe_firmware |
||
cisco catalyst_9130axi_firmware |
||
cisco catalyst_9136_firmware |
||
cisco catalyst_9162_firmware |
||
cisco catalyst_9164_firmware |
||
cisco catalyst_9166_firmware |