#VU9095 Denial of service in Aironet


Published: 2017-11-02

Vulnerability identifier: #VU9095

Vulnerability risk: Low

CVSSv3.1: 4.3 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L/E:U/RL:U/RC:C]

CVE-ID: CVE-2017-12283

CWE-ID: CWE-200

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Aironet
Hardware solutions / Firmware

Vendor: Cisco Systems, Inc

Description
The vulnerability allows an adjacent attacker to cause DoS condition on the target system.

The weakness exists in the handling of 802.11w Protected Management Frames (PAF) by Cisco Aironet 3800 Series Access Points due to improper validation of received 802.11w PAF disassociation and deauthentication frames. An adjacent attacker can send a spoofed 802.11w PAF frame from a valid, authenticated client on an adjacent network and terminate a single valid user connection to the affected device.

Mitigation
Cybersecurity Help is currently unaware of any solutions addressing the vulnerability.

Vulnerable software versions

Aironet: 3800 Series


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet4


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability