SB2021051920 - Multiple vulnerabilities in Cisco Aironet products
Published: May 19, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 3 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2020-24586)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists in the 802.11 standard due to the affected device does not clear its cache/memory to remove fragments of an incomplete MSDU/MMPDU from previous session after reconnection/reassociation. A remote attacker on the local network can perform a fragment cache attack and perform a denial of service (DoS) attack.
2) Spoofing attack (CVE-ID: CVE-2020-24588)
The vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in Windows Wireless Networking. A remote attacker on the local network can spoof page content.
3) Input validation error (CVE-ID: CVE-2020-26146)
The vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. A remote attacker on the local network can exfiltrate selected fragments.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu"
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wifi-faf-22epcEWu</a></p><p><a
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449"
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24449</a></p><p><a
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24423"
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24423</a></p><p>
- https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24441</p><p><br></p>