A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent malicious user to exhaust resources on an affected device. This vulnerability is due to insufficient management of resources when handling certain types of traffic. An attacker could exploit this vulnerability by sending a series of specific wireless packets to an affected device. A successful exploit could allow the malicious user to consume resources on an affected device. A sustained attack could lead to the disruption of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel and intermittent loss of wireless client traffic.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco wireless lan controller software |
||
cisco catalyst 9800 embedded wireless controller firmware |
||
cisco business 150ax firmware |
||
cisco business 151axm firmware |