Multiple vulnerabilities in Cisco Aironet Access Points



Published: 2020-09-29
Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2020-3552
CVE-2020-3559
CVE-2020-3560
CWE-ID CWE-476
CWE-400
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Cisco Aironet 1540 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Aironet 1560 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco 1810 Aironet Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Aironet 1850 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Aironet 1815 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Aironet 1840 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Aironet 2800 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Aironet 3800 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Catalyst 9800 Wireless Controller
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Business Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Aironet 1800 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Small Business 100 Series Wireless Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Small Business 200 Series Smart Switches
Hardware solutions / Routers & switches, VoIP, GSM, etc

Integrated Access Point on 1100 Integrated Services Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco 4800 Aironet Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Catalyst 9100
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Catalyst IW 6300
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco ESW6300 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Wireless LAN Controller
Hardware solutions / Firmware

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) NULL pointer dereference

EUVDB-ID: #VU47136

Risk: Low

CVSSv3.1: 6.4 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-3552

CWE-ID: CWE-476 - NULL Pointer Dereference

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a NULL pointer dereference error. A remote attacker can pass specially crafted data to the application and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cisco Aironet 1540 Series Access Points: All versions

Cisco Aironet 1560 Series Access Points: All versions

Cisco 1810 Aironet Access Points: All versions

Cisco Aironet 1850 Series Access Points: All versions

Cisco Aironet 1815 Series Access Points : All versions

Cisco Aironet 1840 Series Access Points : All versions

Cisco Aironet 2800 Series Access Points: All versions

Cisco Aironet 3800 Series Access Points: All versions

Cisco Wireless LAN Controller: 8.8 - 8.9

Cisco Catalyst 9800 Wireless Controller: 16.12

Cisco Business Access Points: 10.0

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ethport-dos-xtjTt8pY


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Resource exhaustion

EUVDB-ID: #VU47139

Risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-3559

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources. A remote attacker can send authentication requests, trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cisco Aironet 1800 Series Access Points: All versions

Cisco Small Business 100 Series Wireless Access Points: All versions

Cisco Small Business 200 Series Smart Switches: All versions

Integrated Access Point on 1100 Integrated Services Routers: All versions

Cisco Wireless LAN Controller: 8.5 - 8.10

Cisco Catalyst 9800 Wireless Controller: 16.12

Cisco Business Access Points: 10.0

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-h3DCuLXw


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Resource exhaustion

EUVDB-ID: #VU47140

Risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-3560

CWE-ID: CWE-400 - Resource exhaustion

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper handling of clients that are trying to connect to the AP. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cisco Aironet 1540 Series Access Points: All versions

Cisco Aironet 1560 Series Access Points: All versions

Cisco Aironet 1800 Series Access Points: All versions

Cisco Aironet 2800 Series Access Points: All versions

Cisco Aironet 3800 Series Access Points: All versions

Cisco 4800 Aironet Access Points: All versions

Cisco Small Business 100 Series Wireless Access Points: All versions

Cisco Small Business 200 Series Smart Switches: All versions

Cisco Catalyst 9100: All versions

Cisco Catalyst IW 6300: All versions

Cisco ESW6300 Series Access Points: All versions

Integrated Access Point on 1100 Integrated Services Routers: All versions

Cisco Wireless LAN Controller: 8.5 - 8.10

Cisco Catalyst 9800 Wireless Controller: 16.12

Cisco Business Access Points: 10.0

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###