CVE-2020-3560 (GCVE-0-2020-3560)
Vulnerability from cvelistv5 – Published: 2020-09-24 17:50 – Updated: 2024-11-13 18:02
VLAI?
Summary
A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.
Severity ?
8.6 (High)
CWE
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco Aironet Access Point Software |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T07:37:54.978Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20200924 Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-3560",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-13T17:12:51.980714Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-13T18:02:03.327Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco Aironet Access Point Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2020-09-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-09-24T17:50:59",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20200924 Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y"
}
],
"source": {
"advisory": "cisco-sa-aironet-dos-VHr2zG9y",
"defect": [
[
"CSCvr85609",
"CSCvr85614"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2020-09-24T16:00:00",
"ID": "CVE-2020-3560",
"STATE": "PUBLIC",
"TITLE": "Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Aironet Access Point Software",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "8.6",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-400"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20200924 Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y"
}
]
},
"source": {
"advisory": "cisco-sa-aironet-dos-VHr2zG9y",
"defect": [
[
"CSCvr85609",
"CSCvr85614"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2020-3560",
"datePublished": "2020-09-24T17:50:59.499854Z",
"dateReserved": "2019-12-12T00:00:00",
"dateUpdated": "2024-11-13T18:02:03.327Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:wireless_lan_controller:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.9\", \"versionEndExcluding\": \"8.10.112.0\", \"matchCriteriaId\": \"3FAC3262-0899-4F22-8EE7-27F35FB7276D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8.5.161.0\", \"matchCriteriaId\": \"0E903427-F63E-4E51-AC2D-96A707261DEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.6\", \"versionEndExcluding\": \"8.8.130.0\", \"matchCriteriaId\": \"B5E7FBB2-4D72-47E2-84A2-AF8FE3CCE876\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1111-4pwe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7262ADAB-296F-4DC2-9CD7-A86D7F6441C8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1111-8plteeawb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"929A06B1-38F1-42F4-B179-D42B04506AFC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1111-8pwb:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E3056B31-1977-4472-BC74-19A5B8B5EC44\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1113-8plteeawe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9261A638-E2E4-4EF0-84E9-A585BF763263\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1113-8pmwe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C85463D-0B37-4746-B7EA-80F3096305E7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1113-8pwe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58C04E5B-AC03-440F-9007-0D6761B41F68\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1116-4plteeawe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29A5E963-2987-4927-862A-6375624FC876\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1116-4pwe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3601499F-AD3B-47EA-816A-A01379CA1A33\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1117-4plteeawe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"303129EF-9107-4B39-8683-1BD917B3E68D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1117-4pmlteeawe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76B2B271-555B-4439-95D8-086E516F1169\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1117-4pmwe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CB321CD-9096-4F75-AD2F-4EAE1CA75D76\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:1117-4pwe:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"98F31C77-0303-4FD9-B968-6B430202C6AD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5DB7510-2741-464A-8FC9-8419985E330F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3AE916B2-CAAD-4508-A47E-A7D4D88B077A\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D717945-EE41-4D0F-86EF-90826EBE9C3E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"99EAEA92-6589-4DFB-BC4B-8CBA425452D9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D27AB201-342D-4517-9E05-6088598F4695\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8BF9DDB-884D-47B5-A295-8BFA5207C412\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4590D445-B4B6-48E6-BF55-BEA6BA763410\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"848CC5CD-1982-4F31-A626-BD567E1C19F0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24E47788-9B54-42C5-AD83-428B22674575\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A333CD0B-4729-4E64-8B52-A3F5138F5B70\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"098A82FF-95F7-416A-BADD-C57CE81ACD32\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD1D5813-9223-4B3F-9DE2-F3EF854FC927\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10D7583E-2B61-40F1-B9A6-701DA08F8CDF\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"945DDBE7-6233-416B-9BEE-7029F047E298\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0ED89428-750C-4C26-B2A1-E3D63F8B3F44\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C4D8A4CB-5B80-4332-BCBC-DA18AD94D215\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:business_140ac:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6331ADD0-9438-4095-84D4-4434C4782C60\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:business_145ac:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19202724-5BEB-487C-98EA-F3B6924C52CD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:business_240ac:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"07135C18-DDB4-41F3-971F-A4FC38C99E26\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F3CCCFE-88CC-4F7B-8958-79CA62516EA9\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4081C532-3B10-4FBF-BB22-5BA17BC6FCF8\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A47C2D6F-8F90-4D74-AFE1-EAE954021F46\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1C8E35A-5A9B-4D56-A753-937D5CFB5B19\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C559D6F7-B432-4A2A-BE0E-9697CC412C70\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:esw-6300-con-x-k9:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED3625BC-9003-4E07-B4EA-EB44CADDD6B4\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:business_access_points:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.0\", \"versionEndExcluding\": \"10.1.1.0\", \"matchCriteriaId\": \"78149144-CCF5-4C71-B22D-45261C4ACABC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:access_points:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"16.12.4a\", \"matchCriteriaId\": \"70B4ABE1-4F2F-478A-AA0E-8F293105FEBE\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B9ED0E5-CB20-4106-9CF2-8EB587B33543\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B0E620C-8E09-4F7C-A326-26013173B993\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF93F1C8-669F-4ECB-8D81-ECDA7B550175\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2E0BA345-B7D7-4975-9199-4DC7875BBFD0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EA0BC769-C244-41BD-BE80-E67F4E1CDDA4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:aironet_access_point_software:8.5\\\\(154.27\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F7E9751-8192-4418-89BE-58D83E1BC2F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:aironet_access_point_software:8.8\\\\(125.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CBF1E5E-E88B-46EA-AF9A-A52B9CF84273\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:aironet_access_point_software:8.10\\\\(105.0\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C522D2E-422A-47E9-884B-708E4F4BF203\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:aironet_access_point_software:8.10\\\\(105.4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50089912-8D92-4A0F-83C6-2C9BB3B7CF61\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:aironet_access_point_software:17.1.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A94467F-9120-4165-832C-292F343AD65A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:aironet_access_point_software:17.1.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9301B023-A2C5-4DAD-9A05-FDE751AF3C41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:cisco:aironet_access_point_software:17.2.0.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E600825D-4984-488E-BF44-89816CAB6869\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24E47788-9B54-42C5-AD83-428B22674575\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A333CD0B-4729-4E64-8B52-A3F5138F5B70\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en Cisco Aironet Access Points (APs), podr\\u00eda permitir a un atacante remoto no autenticado causar una denegaci\\u00f3n de servicio (DoS) en un dispositivo afectado.\u0026#xa0;La vulnerabilidad es debido a una gesti\\u00f3n inapropiada de los recursos al procesar paquetes espec\\u00edficos.\u0026#xa0;Un atacante podr\\u00eda explotar esta vulnerabilidad mediante el env\\u00edo de una serie de paquetes UDP dise\\u00f1ados hacia un puerto espec\\u00edfico en un dispositivo afectado.\u0026#xa0;Una explotaci\\u00f3n con \\u00e9xito podr\\u00eda permitir al atacante romper la conexi\\u00f3n entre el AP y el controlador de LAN inal\\u00e1mbrico, resultando que el dispositivo afectado no sea capaz de procesar el tr\\u00e1fico del cliente, o causar que el dispositivo vulnerable se recargue, desencadenando en una condici\\u00f3n DoS.\u0026#xa0;Despu\\u00e9s del ataque, el dispositivo afectado deber\\u00eda recuperar autom\\u00e1ticamente sus funciones normales sin intervenci\\u00f3n manual.\"}]",
"id": "CVE-2020-3560",
"lastModified": "2024-11-21T05:31:19.017",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"baseScore\": 8.6, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 4.0}], \"cvssMetricV30\": [{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"baseScore\": 8.6, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 4.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 7.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-09-24T18:15:22.137",
"references": "[{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-400\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-3560\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2020-09-24T18:15:22.137\",\"lastModified\":\"2024-11-21T05:31:19.017\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en Cisco Aironet Access Points (APs), podr\u00eda permitir a un atacante remoto no autenticado causar una denegaci\u00f3n de servicio (DoS) en un dispositivo afectado.\u0026#xa0;La vulnerabilidad es debido a una gesti\u00f3n inapropiada de los recursos al procesar paquetes espec\u00edficos.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una serie de paquetes UDP dise\u00f1ados hacia un puerto espec\u00edfico en un dispositivo afectado.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante romper la conexi\u00f3n entre el AP y el controlador de LAN inal\u00e1mbrico, resultando que el dispositivo afectado no sea capaz de procesar el tr\u00e1fico del cliente, o causar que el dispositivo vulnerable se recargue, desencadenando en una condici\u00f3n DoS.\u0026#xa0;Despu\u00e9s del ataque, el dispositivo afectado deber\u00eda recuperar autom\u00e1ticamente sus funciones normales sin intervenci\u00f3n manual.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0}],\"cvssMetricV30\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":7.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-400\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:wireless_lan_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.9\",\"versionEndExcluding\":\"8.10.112.0\",\"matchCriteriaId\":\"3FAC3262-0899-4F22-8EE7-27F35FB7276D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.5.161.0\",\"matchCriteriaId\":\"0E903427-F63E-4E51-AC2D-96A707261DEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.6\",\"versionEndExcluding\":\"8.8.130.0\",\"matchCriteriaId\":\"B5E7FBB2-4D72-47E2-84A2-AF8FE3CCE876\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1111-4pwe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7262ADAB-296F-4DC2-9CD7-A86D7F6441C8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1111-8plteeawb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"929A06B1-38F1-42F4-B179-D42B04506AFC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1111-8pwb:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3056B31-1977-4472-BC74-19A5B8B5EC44\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1113-8plteeawe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9261A638-E2E4-4EF0-84E9-A585BF763263\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1113-8pmwe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C85463D-0B37-4746-B7EA-80F3096305E7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1113-8pwe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58C04E5B-AC03-440F-9007-0D6761B41F68\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1116-4plteeawe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29A5E963-2987-4927-862A-6375624FC876\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1116-4pwe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3601499F-AD3B-47EA-816A-A01379CA1A33\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1117-4plteeawe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"303129EF-9107-4B39-8683-1BD917B3E68D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1117-4pmlteeawe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76B2B271-555B-4439-95D8-086E516F1169\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1117-4pmwe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CB321CD-9096-4F75-AD2F-4EAE1CA75D76\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:1117-4pwe:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98F31C77-0303-4FD9-B968-6B430202C6AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5DB7510-2741-464A-8FC9-8419985E330F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AE916B2-CAAD-4508-A47E-A7D4D88B077A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D717945-EE41-4D0F-86EF-90826EBE9C3E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"99EAEA92-6589-4DFB-BC4B-8CBA425452D9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D27AB201-342D-4517-9E05-6088598F4695\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8BF9DDB-884D-47B5-A295-8BFA5207C412\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4590D445-B4B6-48E6-BF55-BEA6BA763410\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"848CC5CD-1982-4F31-A626-BD567E1C19F0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24E47788-9B54-42C5-AD83-428B22674575\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A333CD0B-4729-4E64-8B52-A3F5138F5B70\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"098A82FF-95F7-416A-BADD-C57CE81ACD32\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD1D5813-9223-4B3F-9DE2-F3EF854FC927\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D7583E-2B61-40F1-B9A6-701DA08F8CDF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"945DDBE7-6233-416B-9BEE-7029F047E298\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ED89428-750C-4C26-B2A1-E3D63F8B3F44\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4D8A4CB-5B80-4332-BCBC-DA18AD94D215\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:business_140ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6331ADD0-9438-4095-84D4-4434C4782C60\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:business_145ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19202724-5BEB-487C-98EA-F3B6924C52CD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:business_240ac:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07135C18-DDB4-41F3-971F-A4FC38C99E26\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F3CCCFE-88CC-4F7B-8958-79CA62516EA9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4081C532-3B10-4FBF-BB22-5BA17BC6FCF8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FCE2220-E2E6-4A17-9F0A-2C927FAB4AA5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A47C2D6F-8F90-4D74-AFE1-EAE954021F46\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1C8E35A-5A9B-4D56-A753-937D5CFB5B19\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C559D6F7-B432-4A2A-BE0E-9697CC412C70\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:esw-6300-con-x-k9:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED3625BC-9003-4E07-B4EA-EB44CADDD6B4\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:business_access_points:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0\",\"versionEndExcluding\":\"10.1.1.0\",\"matchCriteriaId\":\"78149144-CCF5-4C71-B22D-45261C4ACABC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:access_points:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"16.12.4a\",\"matchCriteriaId\":\"70B4ABE1-4F2F-478A-AA0E-8F293105FEBE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B9ED0E5-CB20-4106-9CF2-8EB587B33543\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B0E620C-8E09-4F7C-A326-26013173B993\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF93F1C8-669F-4ECB-8D81-ECDA7B550175\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E0BA345-B7D7-4975-9199-4DC7875BBFD0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E9EA95F-4E39-4D9C-8A84-D1F6014A4A40\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA0BC769-C244-41BD-BE80-E67F4E1CDDA4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:aironet_access_point_software:8.5\\\\(154.27\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F7E9751-8192-4418-89BE-58D83E1BC2F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:aironet_access_point_software:8.8\\\\(125.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CBF1E5E-E88B-46EA-AF9A-A52B9CF84273\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:aironet_access_point_software:8.10\\\\(105.0\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C522D2E-422A-47E9-884B-708E4F4BF203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:aironet_access_point_software:8.10\\\\(105.4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50089912-8D92-4A0F-83C6-2C9BB3B7CF61\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:aironet_access_point_software:17.1.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A94467F-9120-4165-832C-292F343AD65A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:aironet_access_point_software:17.1.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9301B023-A2C5-4DAD-9A05-FDE751AF3C41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:aironet_access_point_software:17.2.0.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E600825D-4984-488E-BF44-89816CAB6869\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24E47788-9B54-42C5-AD83-428B22674575\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A333CD0B-4729-4E64-8B52-A3F5138F5B70\"}]}]}],\"references\":[{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y\", \"name\": \"20200924 Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T07:37:54.978Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-3560\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-13T17:12:51.980714Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-13T17:15:17.916Z\"}}], \"cna\": {\"title\": \"Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability\", \"source\": {\"defect\": [[\"CSCvr85609\", \"CSCvr85614\"]], \"advisory\": \"cisco-sa-aironet-dos-VHr2zG9y\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_0\": {\"scope\": \"CHANGED\", \"version\": \"3.0\", \"baseScore\": 8.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco Aironet Access Point Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"datePublic\": \"2020-09-24T00:00:00\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y\", \"name\": \"20200924 Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-400\", \"description\": \"CWE-400\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2020-09-24T17:50:59\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"8.6\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\"}}, \"source\": {\"defect\": [[\"CSCvr85609\", \"CSCvr85614\"]], \"advisory\": \"cisco-sa-aironet-dos-VHr2zG9y\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"Cisco Aironet Access Point Software\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-dos-VHr2zG9y\", \"name\": \"20200924 Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability\", \"refsource\": \"CISCO\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-400\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2020-3560\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco Aironet Access Points UDP Flooding Denial of Service Vulnerability\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2020-09-24T16:00:00\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2020-3560\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-13T18:02:03.327Z\", \"dateReserved\": \"2019-12-12T00:00:00\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2020-09-24T17:50:59.499854Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…