SB2021051812 - Multiple vulnerabilities in Cisco Catalyst 9117 APs and Catalyst 9130 APs
Published: May 18, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2020-24586)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists in the 802.11 standard due to the affected device does not clear its cache/memory to remove fragments of an incomplete MSDU/MMPDU from previous session after reconnection/reassociation. A remote attacker on the local network can perform a fragment cache attack and perform a denial of service (DoS) attack.
2) Spoofing attack (CVE-ID: CVE-2020-24588)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in Windows Wireless Networking. A remote attacker on the local network can spoof page content.
3) Input validation error (CVE-ID: CVE-2020-26146)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. A remote attacker on the local network can exfiltrate selected fragments.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu?123"
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu?123</a></p><p><a
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456"
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24456</a></p><p><a
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428"
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24428</a></p><p>
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24439</p><p><br></p>