All the vulnerabilites related to cisco - aironet_3600e
Vulnerability from fkie_nvd
Published
2014-11-15 02:59
Modified
2024-11-21 02:18
Severity ?
Summary
The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6230A85-30D2-4934-A8A0-11499B7B09F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1040:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7361553C-439A-4EFC-B47C-5D099132A9BD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1140:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42E54595-DEA2-4CDA-B218-89B034EB129F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "900C8376-9891-4CAF-8873-1CE78CFEB050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D385DFB0-FE3D-4217-B17A-1AB4A34363AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86AFB6B7-F5A5-4F87-A149-53FC82D5D863",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3600e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E201F1-02D0-4023-9A50-3D8F1A9EC357",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3600i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CBE08A-4F2B-452D-B3B3-034DE13E86CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3600p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE92197-190B-466A-B7A7-268051DA4395",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_600_office_extend:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "903A79E0-184A-4CFB-96FA-A3E0474503FD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1130ag:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D56D069-0E19-4E60-A30A-23C27964B674",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1131:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA740581-ED86-4822-9516-BCCA4C267561",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E8B5553-7295-4786-9F81-B4527EAD4F0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1230ag:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01A48851-D4D5-4ABC-A44A-F82A97882C45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1240:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AAA8DE4-4E1D-4286-846D-0381BF68632F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1240ag:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "17BBE092-4156-45E8-A7ED-55C2765580CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1300:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F02967F7-FC29-460E-A07E-99397E55A63F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1400:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D84F4CEF-F599-48EE-A5FA-252880332A84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap340:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DBDCD08-D3E9-4E72-BC5E-A9A9453D32A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap340:11.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8F1355-5A18-4692-B54C-083291E751E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap350:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF8AA1B-17C3-49E3-BA0F-17FFCE2AAE03",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap350:11.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "97943532-2C6A-4867-BD40-1B848BD2009A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281."
    },
    {
      "lang": "es",
      "value": "La implementaci\u00f3n DHCP en Cisco IOS en puntos de acceso Aironet no maneja debidamente las condiciones de error con concesiones cortas ni los intentos de renovaci\u00f3n de concesi\u00f3n sin \u00e9xito, lo que permite a atacantes remotos causar una denegaci\u00f3n de servicio (reinicio del dispositivo) mediante la activaci\u00f3n de una transici\u00f3n a un estado de recuperaci\u00f3n con la intenci\u00f3n de provocar un reinicio de la interfaz de red, pero en realidad implica un reinicio completo del dispositivo, tambi\u00e9n conocido como Bug ID CSCtn16281."
    }
  ],
  "id": "CVE-2014-7997",
  "lastModified": "2024-11-21T02:18:24.057",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-11-15T02:59:01.517",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id/1031218"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1031218"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-11-15 02:59
Modified
2024-11-21 02:18
Severity ?
Summary
Cisco IOS on Aironet access points, when "dot11 aaa authenticator" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6230A85-30D2-4934-A8A0-11499B7B09F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1040:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7361553C-439A-4EFC-B47C-5D099132A9BD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1140:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42E54595-DEA2-4CDA-B218-89B034EB129F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_1260:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "900C8376-9891-4CAF-8873-1CE78CFEB050",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D385DFB0-FE3D-4217-B17A-1AB4A34363AA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86AFB6B7-F5A5-4F87-A149-53FC82D5D863",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3600e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E201F1-02D0-4023-9A50-3D8F1A9EC357",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3600i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CBE08A-4F2B-452D-B3B3-034DE13E86CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3600p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE92197-190B-466A-B7A7-268051DA4395",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_600_office_extend:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "903A79E0-184A-4CFB-96FA-A3E0474503FD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1100:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D954F30-8AD0-41E9-8D62-BEFEBDCB3B6D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1130ag:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D56D069-0E19-4E60-A30A-23C27964B674",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1131:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA740581-ED86-4822-9516-BCCA4C267561",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1200:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E8B5553-7295-4786-9F81-B4527EAD4F0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1230ag:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01A48851-D4D5-4ABC-A44A-F82A97882C45",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1240:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AAA8DE4-4E1D-4286-846D-0381BF68632F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1240ag:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "17BBE092-4156-45E8-A7ED-55C2765580CC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1300:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F02967F7-FC29-460E-A07E-99397E55A63F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap1400:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D84F4CEF-F599-48EE-A5FA-252880332A84",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap340:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DBDCD08-D3E9-4E72-BC5E-A9A9453D32A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap340:11.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8F1355-5A18-4692-B54C-083291E751E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap350:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AF8AA1B-17C3-49E3-BA0F-17FFCE2AAE03",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_ap350:11.21:*:*:*:*:*:*:*",
              "matchCriteriaId": "97943532-2C6A-4867-BD40-1B848BD2009A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco IOS on Aironet access points, when \"dot11 aaa authenticator\" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509."
    },
    {
      "lang": "es",
      "value": "Cisco IOS en puntos de acceso Aironet, cuando la depuraci\u00f3n est\u00e1 habilitada en \u0027dot11 aaa authenticator\u0027, permite a atacantes remotos a causar una denegaci\u00f3n de servicio a trav\u00e9s de un paquete EAP mal-formado, tambi\u00e9n conocido como Bug ID CSCul15509."
    }
  ],
  "id": "CVE-2014-7998",
  "lastModified": "2024-11-21T02:18:24.163",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-11-15T02:59:02.893",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id/1031219"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98692"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1031219"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98692"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-07-23 11:03
Modified
2024-11-21 01:53
Severity ?
Summary
Cisco Aironet 3600 access points allow remote attackers to cause a denial of service (memory corruption and device crash) by disrupting Cisco Wireless LAN Controller communication and consequently forcing many transitions from FlexConnect mode to Standalone mode, aka Bug ID CSCuh71210.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86AFB6B7-F5A5-4F87-A149-53FC82D5D863",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3600e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35E201F1-02D0-4023-9A50-3D8F1A9EC357",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3600i:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65CBE08A-4F2B-452D-B3B3-034DE13E86CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:aironet_3600p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CE92197-190B-466A-B7A7-268051DA4395",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Aironet 3600 access points allow remote attackers to cause a denial of service (memory corruption and device crash) by disrupting Cisco Wireless LAN Controller communication and consequently forcing many transitions from FlexConnect mode to Standalone mode, aka Bug ID CSCuh71210."
    },
    {
      "lang": "es",
      "value": "puntos de acceso Cisco Aironet 3600 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de dispositivo y corrupci\u00f3n de memoria) mediante la interrupci\u00f3n de la comunicaci\u00f3n del Cisco Wireless LAN Controller y consecuentemente forzando numerosas transiciones desde el modo FlexConnect al Standalone. Aka Bug ID CSCuh71210."
    }
  ],
  "id": "CVE-2013-3441",
  "lastModified": "2024-11-21T01:53:38.447",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 5.4,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-07-23T11:03:11.990",
  "references": [
    {
      "source": "ykramarz@cisco.com",
      "url": "http://osvdb.org/95548"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3441"
    },
    {
      "source": "ykramarz@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30170"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securityfocus.com/bid/61404"
    },
    {
      "source": "ykramarz@cisco.com",
      "url": "http://www.securitytracker.com/id/1028818"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/95548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3441"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/61404"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1028818"
    }
  ],
  "sourceIdentifier": "ykramarz@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2013-3441
Vulnerability from cvelistv5
Published
2013-07-22 19:00
Modified
2024-08-06 16:07
Severity ?
Summary
Cisco Aironet 3600 access points allow remote attackers to cause a denial of service (memory corruption and device crash) by disrupting Cisco Wireless LAN Controller communication and consequently forcing many transitions from FlexConnect mode to Standalone mode, aka Bug ID CSCuh71210.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:07:37.919Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1028818",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1028818"
          },
          {
            "name": "61404",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/61404"
          },
          {
            "name": "95548",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/95548"
          },
          {
            "name": "20130722 Cisco Aironet 3600 Series Access Point Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3441"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30170"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-07-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Aironet 3600 access points allow remote attackers to cause a denial of service (memory corruption and device crash) by disrupting Cisco Wireless LAN Controller communication and consequently forcing many transitions from FlexConnect mode to Standalone mode, aka Bug ID CSCuh71210."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-17T21:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1028818",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1028818"
        },
        {
          "name": "61404",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/61404"
        },
        {
          "name": "95548",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/95548"
        },
        {
          "name": "20130722 Cisco Aironet 3600 Series Access Point Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3441"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30170"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2013-3441",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Aironet 3600 access points allow remote attackers to cause a denial of service (memory corruption and device crash) by disrupting Cisco Wireless LAN Controller communication and consequently forcing many transitions from FlexConnect mode to Standalone mode, aka Bug ID CSCuh71210."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1028818",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1028818"
            },
            {
              "name": "61404",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/61404"
            },
            {
              "name": "95548",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/95548"
            },
            {
              "name": "20130722 Cisco Aironet 3600 Series Access Point Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-3441"
            },
            {
              "name": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30170",
              "refsource": "CONFIRM",
              "url": "http://tools.cisco.com/security/center/viewAlert.x?alertId=30170"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2013-3441",
    "datePublished": "2013-07-22T19:00:00",
    "dateReserved": "2013-05-06T00:00:00",
    "dateUpdated": "2024-08-06T16:07:37.919Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-7997
Vulnerability from cvelistv5
Published
2014-11-15 02:00
Modified
2024-08-06 13:03
Severity ?
Summary
The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:03:27.650Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-aironet-cve20147997-dos(98691)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691"
          },
          {
            "name": "1031218",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1031218"
          },
          {
            "name": "20141114 Cisco Aironet DHCP Denial of Service Vulnerabilty",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-11-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-07T15:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-aironet-cve20147997-dos(98691)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691"
        },
        {
          "name": "1031218",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1031218"
        },
        {
          "name": "20141114 Cisco Aironet DHCP Denial of Service Vulnerabilty",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-7997",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "cisco-aironet-cve20147997-dos(98691)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98691"
            },
            {
              "name": "1031218",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1031218"
            },
            {
              "name": "20141114 Cisco Aironet DHCP Denial of Service Vulnerabilty",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-7997",
    "datePublished": "2014-11-15T02:00:00",
    "dateReserved": "2014-10-08T00:00:00",
    "dateUpdated": "2024-08-06T13:03:27.650Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-7998
Vulnerability from cvelistv5
Published
2014-11-15 02:00
Modified
2024-08-06 13:10
Severity ?
Summary
Cisco IOS on Aironet access points, when "dot11 aaa authenticator" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:10:49.464Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ciscoios-eap-cve20147998-dos(98692)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98692"
          },
          {
            "name": "1031219",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1031219"
          },
          {
            "name": "20141114 Cisco Aironet EAP Debugging Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-11-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco IOS on Aironet access points, when \"dot11 aaa authenticator\" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-07T15:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "ciscoios-eap-cve20147998-dos(98692)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98692"
        },
        {
          "name": "1031219",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1031219"
        },
        {
          "name": "20141114 Cisco Aironet EAP Debugging Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2014-7998",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco IOS on Aironet access points, when \"dot11 aaa authenticator\" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ciscoios-eap-cve20147998-dos(98692)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/98692"
            },
            {
              "name": "1031219",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1031219"
            },
            {
              "name": "20141114 Cisco Aironet EAP Debugging Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7998"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2014-7998",
    "datePublished": "2014-11-15T02:00:00",
    "dateReserved": "2014-10-08T00:00:00",
    "dateUpdated": "2024-08-06T13:10:49.464Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}