A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the malicious user to cause an unexpected reload of an affected device, resulting in a DoS condition.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco business 150ax firmware |
||
cisco business 151axm firmware |
||
cisco catalyst 9105ax firmware |
||
cisco catalyst 9105axi firmware |
||
cisco catalyst 9105axw firmware |
||
cisco catalyst 9105i firmware |
||
cisco catalyst 9105w firmware |
||
cisco catalyst 9115 firmware |
||
cisco catalyst 9115ax firmware |
||
cisco catalyst 9115axe firmware |
||
cisco catalyst 9115axi firmware |
||
cisco catalyst 9117 firmware |
||
cisco catalyst 9117ax firmware |
||
cisco catalyst 9117axi firmware |
||
cisco catalyst 9120 firmware |
||
cisco catalyst 9120ax firmware |
||
cisco catalyst 9120axe firmware |
||
cisco catalyst 9120axi firmware |
||
cisco catalyst 9120axp firmware |
||
cisco catalyst 9124 firmware |
||
cisco catalyst 9124ax firmware |
||
cisco catalyst 9124axd firmware |
||
cisco catalyst 9124axi firmware |
||
cisco catalyst 9130 firmware |
||
cisco catalyst 9130ax firmware |
||
cisco catalyst 9130axe firmware |
||
cisco catalyst 9130axi firmware |
||
cisco catalyst 9136 firmware |
||
cisco catalyst 9162 firmware |
||
cisco catalyst 9164 firmware |
||
cisco catalyst 9166 firmware |