Risk | Low |
Patch available | NO |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2020-24586 CVE-2020-24588 CVE-2020-26146 |
CWE-ID | CWE-20 CWE-451 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
ESR6300 Embedded Series Routers Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Catalyst IW 6300 Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Aironet 3800 Series Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Aironet 2800 Series Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Aironet 1560 Series Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco 4800 Aironet Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU53154
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2020-24586
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists in the 802.11 standard due to the affected device does not clear its cache/memory to remove fragments of an incomplete MSDU/MMPDU from previous session after reconnection/reassociation. A remote attacker on the local network can perform a fragment cache attack and perform a denial of service (DoS) attack.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsESR6300 Embedded Series Routers: All versions
Cisco Catalyst IW 6300: All versions
Cisco Aironet 3800 Series Access Points: All versions
Cisco Aironet 2800 Series Access Points: All versions
Cisco Aironet 1560 Series Access Points: All versions
Cisco 4800 Aironet Access Points: All versions
CPE2.3 External linkshttp://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24423
http://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24441
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU53098
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2020-24588
CWE-ID:
CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform spoofing attack.
The vulnerability exists due to incorrect processing of user-supplied data in Windows Wireless Networking. A remote attacker on the local network can spoof page content.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsESR6300 Embedded Series Routers: All versions
Cisco Catalyst IW 6300: All versions
Cisco Aironet 3800 Series Access Points: All versions
Cisco Aironet 2800 Series Access Points: All versions
Cisco Aironet 1560 Series Access Points: All versions
Cisco 4800 Aironet Access Points: All versions
CPE2.3 External linkshttp://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24423
http://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24441
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU53167
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2020-26146
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to the WPA, WPA2, and WPA3 implementations reassemble fragments with non-consecutive packet numbers. A remote attacker on the local network can exfiltrate selected fragments.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsESR6300 Embedded Series Routers: All versions
Cisco Catalyst IW 6300: All versions
Cisco Aironet 3800 Series Access Points: All versions
Cisco Aironet 2800 Series Access Points: All versions
Cisco Aironet 1560 Series Access Points: All versions
Cisco 4800 Aironet Access Points: All versions
CPE2.3 External linkshttp://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24423
http://bst.cloudapps.cisco.com/bugsearch/bug/CSCvx24441
Q & A
Can this vulnerability be exploited remotely?
How the attacker can exploit this vulnerability?
Is there known malware, which exploits this vulnerability?