Vulnerability identifier: #VU9095
Vulnerability risk: Low
CVSSv3.1: 4.3 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L/E:U/RL:U/RC:C]
CVE-ID:
CWE-ID:
CWE-200
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
Aironet
Hardware solutions /
Firmware
Vendor: Cisco Systems, Inc
Description
The vulnerability allows an adjacent attacker to cause DoS condition on the target system.
The weakness exists in the handling of 802.11w Protected Management Frames (PAF) by Cisco Aironet 3800 Series Access Points due to improper validation of received 802.11w PAF disassociation and deauthentication frames. An adjacent attacker can send a
spoofed 802.11w PAF frame from a valid, authenticated client on an
adjacent network and terminate a single valid user connection to the
affected device.
Mitigation
Cybersecurity Help is currently unaware of any solutions addressing the vulnerability.
Vulnerable software versions
Aironet: 3800 Series
External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet4
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.