Action not permitted
Modal body text goes here.
wid-sec-w-2024-0744
Vulnerability from csaf_certbund
Published
2024-03-27 23:00
Modified
2024-03-27 23:00
Summary
Cisco Aironet Access Point: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Aironet Access Point ist eine WLAN Access Point Produktreihe von Cisco
Catalyst ist der Markenname für eine Vielzahl von Netzwerk-Switches die von Cisco Systems verkauft werden.
Router sind Geräte aus dem Bereich Computernetzwerke, Telekommunikation und Internet, die mehrere Rechnernetze miteinander verbinden.
Die Cisco Small Business Produktfamilie beinhaltet Netzwerk-, Kommunikations-, WLAN- und Sicherheitsprodukte, sowie Router und Switche.
Angriff
Ein lokaler Angreifer kann mehrere Schwachstellen in Cisco Aironet Access Point, Cisco Catalyst, Cisco Router und Cisco Small Business ausnutzen, um Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuführen.
Betroffene Betriebssysteme
- CISCO Appliance
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Aironet Access Point ist eine WLAN Access Point Produktreihe von Cisco\r\nCatalyst ist der Markenname f\u00fcr eine Vielzahl von Netzwerk-Switches die von Cisco Systems verkauft werden.\r\n\r\nRouter sind Ger\u00e4te aus dem Bereich Computernetzwerke, Telekommunikation und Internet, die mehrere Rechnernetze miteinander verbinden.\r\nDie Cisco Small Business Produktfamilie beinhaltet Netzwerk-, Kommunikations-, WLAN- und Sicherheitsprodukte, sowie Router und Switche.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Cisco Aironet Access Point, Cisco Catalyst, Cisco Router und Cisco Small Business ausnutzen, um Sicherheitsvorkehrungen zu umgehen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- CISCO Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-0744 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-0744.json" }, { "category": "self", "summary": "WID-SEC-2024-0744 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-0744" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-27", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-27", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W" }, { "category": "external", "summary": "Cisco Security Advisory vom 2024-03-27", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD" } ], "source_lang": "en-US", "title": "Cisco Aironet Access Point: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-03-27T23:00:00.000+00:00", "generator": { "date": "2024-03-28T12:07:30.693+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2024-0744", "initial_release_date": "2024-03-27T23:00:00.000+00:00", "revision_history": [ { "date": "2024-03-27T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Cisco Aironet Access Point", "product": { "name": "Cisco Aironet Access Point", "product_id": "T012215", "product_identification_helper": { "cpe": "cpe:/o:cisco:aironet_access_point_software:-" } } }, { "category": "product_name", "name": "Cisco Catalyst", "product": { "name": "Cisco Catalyst", "product_id": "T000491", "product_identification_helper": { "cpe": "cpe:/h:cisco:catalyst:-" } } }, { "category": "product_name", "name": "Cisco Router", "product": { "name": "Cisco Router", "product_id": "T003258", "product_identification_helper": { "cpe": "cpe:/h:cisco:router:-" } } }, { "category": "product_name", "name": "Cisco Small Business", "product": { "name": "Cisco Small Business", "product_id": "T006607", "product_identification_helper": { "cpe": "cpe:/h:cisco:small_business:-" } } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-20265", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Cisco Aironet Access Point, Cisco Catalyst und Cisco Small Business. Diese sind auf einen Fehler zur\u00fcckzuf\u00fchren, der es erm\u00f6glicht w\u00e4hrend des Boot Prozesses beliebige Befehle abzusetzen und dadurch das Secure Boot Feature zu umgehen. Ein authentisierter Angreifer mit physischem Zugriff kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "T003258", "T012215", "T006607", "T000491" ] }, "release_date": "2024-03-27T23:00:00Z", "title": "CVE-2024-20265" }, { "cve": "CVE-2024-20271", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Cisco Aironet Access Point, Cisco Catalyst, Cisco Router und Cisco Small Business. Diese Schwachstelle ist auf eine fehlerhafte Validierung von IPV4 zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T003258", "T012215", "T006607", "T000491" ] }, "release_date": "2024-03-27T23:00:00Z", "title": "CVE-2024-20271" }, { "cve": "CVE-2024-20354", "notes": [ { "category": "description", "text": "Es existiert eine Schwachstelle in Cisco Aironet Access Point. Diese ist auf eine unzureichende Bereinigung von Ressourcen nach dem Droppen von fehlerhaften Paketen zur\u00fcckzuf\u00fchren. Ein anonymer Angreifer im angrenzenden Netzbereich kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren." } ], "product_status": { "known_affected": [ "T003258", "T012215", "T006607", "T000491" ] }, "release_date": "2024-03-27T23:00:00Z", "title": "CVE-2024-20354" } ] }
cve-2024-20271
Vulnerability from cvelistv5
Published
2024-03-27 17:05
Modified
2024-08-01 21:52
Severity ?
EPSS score ?
Summary
A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:aironet_access_point_software:8.10.111.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.112.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.113.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.121.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.122.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.130.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.141.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.142.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.150.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.151.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.161.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.162.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.170.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.171.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.181.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.182.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.183.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.10.185.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.2\\(100.0\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.2.110.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.2.111.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.2.121.0:*:*:*:*:*:*:*", "cpe:2.3:o:cisco:aironet_access_point_software:8.2\\(130.0\\):*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.2.141.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.2.151.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.2.160.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.2.161.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.2.163.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.2.164.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.2.166.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.2.170.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.102.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.104.14:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.104.37:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.104.46:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.104.64:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.108.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.111.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.112.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.121.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.122.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.130.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.131.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.132.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.133.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.135.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.140.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.141.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.143.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.150.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.117:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.118:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.120:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.142:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.158:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.165:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.169:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.25:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.200.200:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.90.11:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.90.25:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.90.36:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.90.53:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.3.90.58:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.4.100.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.4.1.142:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.4.1.175:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.4.1.199:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.4.1.218:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.4.1.91:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.4.1.92:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.100.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.101.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.102.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.103.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.105.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.110.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.120.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.131.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.135.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.140.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.151.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.160.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.161.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.164.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.171.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.5.182.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.6.101.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.6.1.70:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.6.1.71:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.6.1.84:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.7.102.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.7.106.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.7.1.16:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.8.100.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.8.111.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.8.120.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.8.125.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.8.130.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.9.100.0:*:*:*:*:*:*:*", "cpe:2.3:a:cisco:aironet_access_point_software:8.9.111.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "aironet_access_point_software", "vendor": "cisco", "versions": [ { "status": "affected", "version": "8.10.111.0" }, { "status": "affected", "version": "8.10.112.0" }, { "status": "affected", "version": "8.10.113.0" }, { "status": "affected", "version": "8.10.121.0" }, { "status": "affected", "version": "8.10.122.0" }, { "status": "affected", "version": "8.10.130.0" }, { "status": "affected", "version": "8.10.141.0" }, { "status": "affected", "version": "8.10.142.0" }, { "status": "affected", "version": "8.10.150.0" }, { "status": "affected", "version": "8.10.151.0" }, { "status": "affected", "version": "8.10.161.0" }, { "status": "affected", "version": "8.10.162.0" }, { "status": "affected", "version": "8.10.170.0" }, { "status": "affected", "version": "8.10.171.0" }, { "status": "affected", "version": "8.10.181.0" }, { "status": "affected", "version": "8.10.182.0" }, { "status": "affected", "version": "8.10.183.0" }, { "status": "affected", "version": "8.10.185.0" }, { "status": "affected", "version": "8.2\\(100.0\\)" }, { "status": "affected", "version": "8.2.110.0" }, { "status": "affected", "version": "8.2.111.0" }, { "status": "affected", "version": "8.2.121.0" }, { "status": "affected", "version": "8.2\\(130.0\\)" }, { "status": "affected", "version": "8.2.141.0" }, { "status": "affected", "version": "8.2.151.0" }, { "status": "affected", "version": "8.2.160.0" }, { "status": "affected", "version": "8.2.161.0" }, { "status": "affected", "version": "8.2.163.0" }, { "status": "affected", "version": "8.2.164.0" }, { "status": "affected", "version": "8.2.166.0" }, { "status": "affected", "version": "8.2.170.0" }, { "status": "affected", "version": "8.3.102.0" }, { "status": "affected", "version": "8.3.104.14" }, { "status": "affected", "version": "8.3.104.37" }, { "status": "affected", "version": "8.3.104.46" }, { "status": "affected", "version": "8.3.104.64" }, { "status": "affected", "version": "8.3.108.0" }, { "status": "affected", "version": "8.3.111.0" }, { "status": "affected", "version": "8.3.112.0" }, { "status": "affected", "version": "8.3.121.0" }, { "status": "affected", "version": "8.3.122.0" }, { "status": "affected", "version": "8.3.130.0" }, { "status": "affected", "version": "8.3.131.0" }, { "status": "affected", "version": "8.3.132.0" }, { "status": "affected", "version": "8.3.133.0" }, { "status": "affected", "version": "8.3.135.0" }, { "status": "affected", "version": "8.3.140.0" }, { "status": "affected", "version": "8.3.141.0" }, { "status": "affected", "version": "8.3.143.0" }, { "status": "affected", "version": "8.3.150.0" }, { "status": "affected", "version": "8.3.15.117" }, { "status": "affected", "version": "8.3.15.118" }, { "status": "affected", "version": "8.3.15.120" }, { "status": "affected", "version": "8.3.15.142" }, { "status": "affected", "version": "8.3.15.158" }, { "status": "affected", "version": "8.3.15.165" }, { "status": "affected", "version": "8.3.15.169" }, { "status": "affected", "version": "8.3.15.25" }, { "status": "affected", "version": "8.3.200.200" }, { "status": "affected", "version": "8.3.90.11" }, { "status": "affected", "version": "8.3.90.25" }, { "status": "affected", "version": "8.3.90.36" }, { "status": "affected", "version": "8.3.90.53" }, { "status": "affected", "version": "8.3.90.58" }, { "status": "affected", "version": "8.4.100.0" }, { "status": "affected", "version": "8.4.1.142" }, { "status": "affected", "version": "8.4.1.175" }, { "status": "affected", "version": "8.4.1.199" }, { "status": "affected", "version": "8.4.1.218" }, { "status": "affected", "version": "8.4.1.91" }, { "status": "affected", "version": "8.4.1.92" }, { "status": "affected", "version": "8.5.100.0" }, { "status": "affected", "version": "8.5.101.0" }, { "status": "affected", "version": "8.5.102.0" }, { "status": "affected", "version": "8.5.103.0" }, { "status": "affected", "version": "8.5.105.0" }, { "status": "affected", "version": "8.5.110.0" }, { "status": "affected", "version": "8.5.120.0" }, { "status": "affected", "version": "8.5.131.0" }, { "status": "affected", "version": "8.5.135.0" }, { "status": "affected", "version": "8.5.140.0" }, { "status": "affected", "version": "8.5.151.0" }, { "status": "affected", "version": "8.5.160.0" }, { "status": "affected", "version": "8.5.161.0" }, { "status": "affected", "version": "8.5.164.0" }, { "status": "affected", "version": "8.5.171.0" }, { "status": "affected", "version": "8.5.182.0" }, { "status": "affected", "version": "8.6.101.0" }, { "status": "affected", "version": "8.6.1.70" }, { "status": "affected", "version": "8.6.1.71" }, { "status": "affected", "version": "8.6.1.84" }, { "status": "affected", "version": "8.7.102.0" }, { "status": "affected", "version": "8.7.106.0" }, { "status": "affected", "version": "8.7.1.16" }, { "status": "affected", "version": "8.8.100.0" }, { "status": "affected", "version": "8.8.111.0" }, { "status": "affected", "version": "8.8.120.0" }, { "status": "affected", "version": "8.8.125.0" }, { "status": "affected", "version": "8.8.130.0" }, { "status": "affected", "version": "8.9.100.0" }, { "status": "affected", "version": "8.9.111.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20271", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-03-28T16:39:13.630340Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-28T13:07:00.717Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:52:38.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ap-dos-h9TGGX6W", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Aironet Access Point Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "8.2.100.0" }, { "status": "affected", "version": "8.2.130.0" }, { "status": "affected", "version": "8.2.111.0" }, { "status": "affected", "version": "8.2.110.0" }, { "status": "affected", "version": "8.2.121.0" }, { "status": "affected", "version": "8.2.141.0" }, { "status": "affected", "version": "8.2.151.0" }, { "status": "affected", "version": "8.2.160.0" }, { "status": "affected", "version": "8.2.161.0" }, { "status": "affected", "version": "8.2.164.0" }, { "status": "affected", "version": "8.2.166.0" }, { "status": "affected", "version": "8.2.170.0" }, { "status": "affected", "version": "8.2.163.0" }, { "status": "affected", "version": "8.3.102.0" }, { "status": "affected", "version": "8.3.111.0" }, { "status": "affected", "version": "8.3.112.0" }, { "status": "affected", "version": "8.3.121.0" }, { "status": "affected", "version": "8.3.122.0" }, { "status": "affected", "version": "8.3.130.0" }, { "status": "affected", "version": "8.3.131.0" }, { "status": "affected", "version": "8.3.132.0" }, { "status": "affected", "version": "8.3.133.0" }, { "status": "affected", "version": "8.3.140.0" }, { "status": "affected", "version": "8.3.141.0" }, { "status": "affected", "version": "8.3.143.0" }, { "status": "affected", "version": "8.3.150.0" }, { "status": "affected", "version": "8.3.108.0" }, { "status": "affected", "version": "8.3.90.53" }, { "status": "affected", "version": "8.3.104.46" }, { "status": "affected", "version": "8.3.200.200" }, { "status": "affected", "version": "8.3.104.64" }, { "status": "affected", "version": "8.3.15.165" }, { "status": "affected", "version": "8.3.90.11" }, { "status": "affected", "version": "8.3.135.0" }, { "status": "affected", "version": "8.3.104.14" }, { "status": "affected", "version": "8.3.90.36" }, { "status": "affected", "version": "8.3.15.142" }, { "status": "affected", "version": "8.3.104.37" }, { "status": "affected", "version": "8.3.15.117" }, { "status": "affected", "version": "8.3.15.120" }, { "status": "affected", "version": "8.3.15.25" }, { "status": "affected", "version": "8.3.15.158" }, { "status": "affected", "version": "8.3.15.118" }, { "status": "affected", "version": "8.3.90.25" }, { "status": "affected", "version": "8.3.15.169" }, { "status": "affected", "version": "8.3.90.58" }, { "status": "affected", "version": "8.4.100.0" }, { "status": "affected", "version": "8.4.1.199" }, { "status": "affected", "version": "8.4.1.91" }, { "status": "affected", "version": "8.4.1.142" }, { "status": "affected", "version": "8.4.1.175" }, { "status": "affected", "version": "8.4.1.218" }, { "status": "affected", "version": "8.4.1.92" }, { "status": "affected", "version": "8.5.103.0" }, { "status": "affected", "version": "8.5.105.0" }, { "status": "affected", "version": "8.5.110.0" }, { "status": "affected", "version": "8.5.120.0" }, { "status": "affected", "version": "8.5.131.0" }, { "status": "affected", "version": "8.5.140.0" }, { "status": "affected", "version": "8.5.135.0" }, { "status": "affected", "version": "8.5.151.0" }, { "status": "affected", "version": "8.5.101.0" }, { "status": "affected", "version": "8.5.102.0" }, { "status": "affected", "version": "8.5.161.0" }, { "status": "affected", "version": "8.5.160.0" }, { "status": "affected", "version": "8.5.100.0" }, { "status": "affected", "version": "8.5.171.0" }, { "status": "affected", "version": "8.5.164.0" }, { "status": "affected", "version": "8.5.182.0" }, { "status": "affected", "version": "8.5.182.11 ME" }, { "status": "affected", "version": "8.7.102.0" }, { "status": "affected", "version": "8.7.106.0" }, { "status": "affected", "version": "8.7.1.16" }, { "status": "affected", "version": "8.8.100.0" }, { "status": "affected", "version": "8.8.111.0" }, { "status": "affected", "version": "8.8.120.0" }, { "status": "affected", "version": "8.8.125.0" }, { "status": "affected", "version": "8.8.130.0" }, { "status": "affected", "version": "8.6.101.0" }, { "status": "affected", "version": "8.6.1.84" }, { "status": "affected", "version": "8.6.1.70" }, { "status": "affected", "version": "8.6.1.71" }, { "status": "affected", "version": "8.9.100.0" }, { "status": "affected", "version": "8.9.111.0" }, { "status": "affected", "version": "8.10.105.0" }, { "status": "affected", "version": "8.10.111.0" }, { "status": "affected", "version": "8.10.130.0" }, { "status": "affected", "version": "8.10.112.0" }, { "status": "affected", "version": "8.10.122.0" }, { "status": "affected", "version": "8.10.113.0" }, { "status": "affected", "version": "8.10.121.0" }, { "status": "affected", "version": "8.10.141.0" }, { "status": "affected", "version": "8.10.142.0" }, { "status": "affected", "version": "8.10.151.0" }, { "status": "affected", "version": "8.10.150.0" }, { "status": "affected", "version": "8.10.171.0" }, { "status": "affected", "version": "8.10.181.0" }, { "status": "affected", "version": "8.10.182.0" }, { "status": "affected", "version": "8.10.161.0" }, { "status": "affected", "version": "8.10.170.0" }, { "status": "affected", "version": "8.10.183.0" }, { "status": "affected", "version": "8.10.162.0" }, { "status": "affected", "version": "8.10.185.0" } ] }, { "product": "Cisco Business Wireless Access Point Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "10.0.1.0" }, { "status": "affected", "version": "10.0.2.0" }, { "status": "affected", "version": "10.1.1.0" }, { "status": "affected", "version": "10.1.2.0" }, { "status": "affected", "version": "10.2.1.0" }, { "status": "affected", "version": "10.2.2.0" }, { "status": "affected", "version": "10.3.1.0" }, { "status": "affected", "version": "10.3.1.1" }, { "status": "affected", "version": "10.3.2.0" }, { "status": "affected", "version": "1.0.0.13" }, { "status": "affected", "version": "1.0.0.16" }, { "status": "affected", "version": "1.0.0.3" }, { "status": "affected", "version": "1.0.0.39" }, { "status": "affected", "version": "1.0.0.4" }, { "status": "affected", "version": "1.0.0.5" }, { "status": "affected", "version": "1.0.0.7" }, { "status": "affected", "version": "1.0.1.2" }, { "status": "affected", "version": "1.0.1.3" }, { "status": "affected", "version": "1.0.1.4" }, { "status": "affected", "version": "1.0.1.5" }, { "status": "affected", "version": "1.0.1.6" }, { "status": "affected", "version": "1.0.1.7" }, { "status": "affected", "version": "1.0.2.0" }, { "status": "affected", "version": "1.0.2.13" }, { "status": "affected", "version": "1.0.2.14" }, { "status": "affected", "version": "1.0.2.15" }, { "status": "affected", "version": "1.0.2.16" }, { "status": "affected", "version": "1.0.2.17" }, { "status": "affected", "version": "1.0.2.2" }, { "status": "affected", "version": "1.0.2.8" }, { "status": "affected", "version": "1.0.3.1" }, { "status": "affected", "version": "1.0.4.4" }, { "status": "affected", "version": "1.0.4.3" }, { "status": "affected", "version": "1.0.6.6" }, { "status": "affected", "version": "1.0.3.4" }, { "status": "affected", "version": "1.0.6.8" }, { "status": "affected", "version": "1.0.6.2" }, { "status": "affected", "version": "1.0.2.3" }, { "status": "affected", "version": "1.0.5.3" }, { "status": "affected", "version": "1.0.1.10" }, { "status": "affected", "version": "1.0.4.2" }, { "status": "affected", "version": "1.0.6.5" }, { "status": "affected", "version": "1.0.6.7" }, { "status": "affected", "version": "1.0.5.0" }, { "status": "affected", "version": "1.0.0.10" }, { "status": "affected", "version": "1.0.0.12" }, { "status": "affected", "version": "1.0.0.14" }, { "status": "affected", "version": "1.0.0.15" }, { "status": "affected", "version": "1.0.0.17" }, { "status": "affected", "version": "1.0.0.9" }, { "status": "affected", "version": "1.0.1.11" }, { "status": "affected", "version": "1.0.1.12" }, { "status": "affected", "version": "1.0.1.9" }, { "status": "affected", "version": "1.0.2.6" }, { "status": "affected", "version": "1.1.0.5" }, { "status": "affected", "version": "1.1.0.7" }, { "status": "affected", "version": "1.1.0.9" }, { "status": "affected", "version": "1.1.1.0" }, { "status": "affected", "version": "1.1.2.4" }, { "status": "affected", "version": "1.1.4.6" }, { "status": "affected", "version": "1.1.3.2" }, { "status": "affected", "version": "1.1.4.0" }, { "status": "affected", "version": "1.1.0.3" }, { "status": "affected", "version": "1.1.0.4" }, { "status": "affected", "version": "1.1.0.6" }, { "status": "affected", "version": "1.1.2.3" }, { "status": "affected", "version": "10.4.1.0" }, { "status": "affected", "version": "10.4.2.0" }, { "status": "affected", "version": "10.6.1.0" }, { "status": "affected", "version": "10.7.1.0" }, { "status": "affected", "version": "10.8.1.0" }, { "status": "affected", "version": "1.2.0.2" }, { "status": "affected", "version": "1.2.0.3" }, { "status": "affected", "version": "1.2.1.3" }, { "status": "affected", "version": "1.3.0.3" }, { "status": "affected", "version": "1.3.0.4" }, { "status": "affected", "version": "1.3.0.6" }, { "status": "affected", "version": "1.3.0.7" }, { "status": "affected", "version": "10.5.2.0" } ] }, { "product": "Cisco Aironet Access Point Software (IOS XE Controller)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "16.10.1e" }, { "status": "affected", "version": "16.10.1" }, { "status": "affected", "version": "17.1.1t" }, { "status": "affected", "version": "17.1.1s" }, { "status": "affected", "version": "17.1.1" }, { "status": "affected", "version": "16.11.1a" }, { "status": "affected", "version": "16.11.1" }, { "status": "affected", "version": "16.11.1c" }, { "status": "affected", "version": "16.11.1b" }, { "status": "affected", "version": "16.12.1s" }, { "status": "affected", "version": "16.12.4" }, { "status": "affected", "version": "16.12.1" }, { "status": "affected", "version": "16.12.2s" }, { "status": "affected", "version": "16.12.1t" }, { "status": "affected", "version": "16.12.4a" }, { "status": "affected", "version": "16.12.5" }, { "status": "affected", "version": "16.12.3" }, { "status": "affected", "version": "16.12.6" }, { "status": "affected", "version": "16.12.8" }, { "status": "affected", "version": "16.12.7" }, { "status": "affected", "version": "16.12.6a" }, { "status": "affected", "version": "17.3.1" }, { "status": "affected", "version": "17.3.2a" }, { "status": "affected", "version": "17.3.3" }, { "status": "affected", "version": "17.3.4" }, { "status": "affected", "version": "17.3.5" }, { "status": "affected", "version": "17.3.2" }, { "status": "affected", "version": "17.3.4c" }, { "status": "affected", "version": "17.3.5a" }, { "status": "affected", "version": "17.3.5b" }, { "status": "affected", "version": "17.3.6" }, { "status": "affected", "version": "17.2.1" }, { "status": "affected", "version": "17.2.1a" }, { "status": "affected", "version": "17.2.3" }, { "status": "affected", "version": "17.2.2" }, { "status": "affected", "version": "17.5.1" }, { "status": "affected", "version": "17.4.1" }, { "status": "affected", "version": "17.4.2" }, { "status": "affected", "version": "17.6.1" }, { "status": "affected", "version": "17.6.2" }, { "status": "affected", "version": "17.6.3" }, { "status": "affected", "version": "17.6.4" }, { "status": "affected", "version": "17.6.5" }, { "status": "affected", "version": "17.10.1" }, { "status": "affected", "version": "17.9.1" }, { "status": "affected", "version": "17.9.2" }, { "status": "affected", "version": "17.9.3" }, { "status": "affected", "version": "17.9.4" }, { "status": "affected", "version": "17.9.4a" }, { "status": "affected", "version": "17.7.1" }, { "status": "affected", "version": "17.8.1" }, { "status": "affected", "version": "17.11.1" }, { "status": "affected", "version": "17.12.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "Improper Input Validation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-27T17:05:27.473Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ap-dos-h9TGGX6W", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W" } ], "source": { "advisory": "cisco-sa-ap-dos-h9TGGX6W", "defects": [ "CSCwh00028" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20271", "datePublished": "2024-03-27T17:05:27.473Z", "dateReserved": "2023-11-08T15:08:07.624Z", "dateUpdated": "2024-08-01T21:52:38.878Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20354
Vulnerability from cvelistv5
Published
2024-03-27 16:47
Modified
2024-08-01 21:59
Severity ?
EPSS score ?
Summary
A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device.
This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20354", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-07-18T22:49:23.614193Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-23T18:28:01.520Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:59:41.707Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-airo-ap-dos-PPPtcVW", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco Aironet Access Point Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Aironet Access Point Software (IOS XE Controller)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device.\r\n\r This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "LOW", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-460", "description": "Improper Cleanup on Thrown Exception", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-27T16:47:04.924Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-airo-ap-dos-PPPtcVW", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-ap-dos-PPPtcVW" } ], "source": { "advisory": "cisco-sa-airo-ap-dos-PPPtcVW", "defects": [ "CSCwh81027" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20354", "datePublished": "2024-03-27T16:47:04.924Z", "dateReserved": "2023-11-08T15:08:07.647Z", "dateUpdated": "2024-08-01T21:59:41.707Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-20265
Vulnerability from cvelistv5
Published
2024-03-27 17:03
Modified
2024-08-01 21:52
Severity ?
EPSS score ?
Summary
A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker to bypass the Cisco Secure Boot functionality and load a software image that has been tampered with on an affected device.
This vulnerability exists because unnecessary commands are available during boot time at the physical console. An attacker could exploit this vulnerability by interrupting the boot process and executing specific commands to bypass the Cisco Secure Boot validation checks and load an image that has been tampered with. This image would have been previously downloaded onto the targeted device. A successful exploit could allow the attacker to load the image once. The Cisco Secure Boot functionality is not permanently compromised.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:cisco:aironet_access_point_software:8.2.100.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "aironet_access_point_software", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "8.10.185.0", "status": "affected", "version": "8.2.100.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:business_wireless_access_point_software:10.0.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "business_wireless_access_point_software", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "10.8.1.0", "status": "affected", "version": "10.0.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:cisco:aironet_access_point_software:16.10.1:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "aironet_access_point_software", "vendor": "cisco", "versions": [ { "lessThanOrEqual": "17.11.1", "status": "affected", "version": "16.10.1", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-20265", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-03-27T19:46:28.390425Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-01T15:33:37.498Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:52:31.616Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-ap-secureboot-bypass-zT5vJkSD", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco IOS XE Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "N/A" } ] }, { "product": "Cisco Aironet Access Point Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "8.2.100.0" }, { "status": "affected", "version": "8.2.130.0" }, { "status": "affected", "version": "8.2.111.0" }, { "status": "affected", "version": "8.2.110.0" }, { "status": "affected", "version": "8.2.121.0" }, { "status": "affected", "version": "8.2.141.0" }, { "status": "affected", "version": "8.2.151.0" }, { "status": "affected", "version": "8.2.160.0" }, { "status": "affected", "version": "8.2.161.0" }, { "status": "affected", "version": "8.2.164.0" }, { "status": "affected", "version": "8.2.166.0" }, { "status": "affected", "version": "8.2.170.0" }, { "status": "affected", "version": "8.2.163.0" }, { "status": "affected", "version": "8.3.102.0" }, { "status": "affected", "version": "8.3.111.0" }, { "status": "affected", "version": "8.3.112.0" }, { "status": "affected", "version": "8.3.121.0" }, { "status": "affected", "version": "8.3.122.0" }, { "status": "affected", "version": "8.3.130.0" }, { "status": "affected", "version": "8.3.131.0" }, { "status": "affected", "version": "8.3.132.0" }, { "status": "affected", "version": "8.3.133.0" }, { "status": "affected", "version": "8.3.140.0" }, { "status": "affected", "version": "8.3.141.0" }, { "status": "affected", "version": "8.3.143.0" }, { "status": "affected", "version": "8.3.150.0" }, { "status": "affected", "version": "8.3.108.0" }, { "status": "affected", "version": "8.3.90.53" }, { "status": "affected", "version": "8.3.104.46" }, { "status": "affected", "version": "8.3.200.200" }, { "status": "affected", "version": "8.3.104.64" }, { "status": "affected", "version": "8.3.15.165" }, { "status": "affected", "version": "8.3.90.11" }, { "status": "affected", "version": "8.3.135.0" }, { "status": "affected", "version": "8.3.104.14" }, { "status": "affected", "version": "8.3.90.36" }, { "status": "affected", "version": "8.3.15.142" }, { "status": "affected", "version": "8.3.104.37" }, { "status": "affected", "version": "8.3.15.117" }, { "status": "affected", "version": "8.3.15.120" }, { "status": "affected", "version": "8.3.15.25" }, { "status": "affected", "version": "8.3.15.158" }, { "status": "affected", "version": "8.3.15.118" }, { "status": "affected", "version": "8.3.90.25" }, { "status": "affected", "version": "8.3.15.169" }, { "status": "affected", "version": "8.3.90.58" }, { "status": "affected", "version": "8.4.100.0" }, { "status": "affected", "version": "8.4.1.199" }, { "status": "affected", "version": "8.4.1.91" }, { "status": "affected", "version": "8.4.1.142" }, { "status": "affected", "version": "8.4.1.175" }, { "status": "affected", "version": "8.4.1.218" }, { "status": "affected", "version": "8.4.1.92" }, { "status": "affected", "version": "8.5.103.0" }, { "status": "affected", "version": "8.5.105.0" }, { "status": "affected", "version": "8.5.110.0" }, { "status": "affected", "version": "8.5.120.0" }, { "status": "affected", "version": "8.5.131.0" }, { "status": "affected", "version": "8.5.140.0" }, { "status": "affected", "version": "8.5.135.0" }, { "status": "affected", "version": "8.5.151.0" }, { "status": "affected", "version": "8.5.101.0" }, { "status": "affected", "version": "8.5.102.0" }, { "status": "affected", "version": "8.5.161.0" }, { "status": "affected", "version": "8.5.160.0" }, { "status": "affected", "version": "8.5.100.0" }, { "status": "affected", "version": "8.5.171.0" }, { "status": "affected", "version": "8.5.164.0" }, { "status": "affected", "version": "8.5.182.0" }, { "status": "affected", "version": "8.5.182.11 ME" }, { "status": "affected", "version": "8.7.102.0" }, { "status": "affected", "version": "8.7.106.0" }, { "status": "affected", "version": "8.7.1.16" }, { "status": "affected", "version": "8.8.100.0" }, { "status": "affected", "version": "8.8.111.0" }, { "status": "affected", "version": "8.8.120.0" }, { "status": "affected", "version": "8.8.125.0" }, { "status": "affected", "version": "8.8.130.0" }, { "status": "affected", "version": "8.6.101.0" }, { "status": "affected", "version": "8.6.1.84" }, { "status": "affected", "version": "8.6.1.70" }, { "status": "affected", "version": "8.6.1.71" }, { "status": "affected", "version": "8.9.100.0" }, { "status": "affected", "version": "8.9.111.0" }, { "status": "affected", "version": "8.10.105.0" }, { "status": "affected", "version": "8.10.111.0" }, { "status": "affected", "version": "8.10.130.0" }, { "status": "affected", "version": "8.10.112.0" }, { "status": "affected", "version": "8.10.122.0" }, { "status": "affected", "version": "8.10.113.0" }, { "status": "affected", "version": "8.10.121.0" }, { "status": "affected", "version": "8.10.141.0" }, { "status": "affected", "version": "8.10.142.0" }, { "status": "affected", "version": "8.10.151.0" }, { "status": "affected", "version": "8.10.150.0" }, { "status": "affected", "version": "8.10.171.0" }, { "status": "affected", "version": "8.10.181.0" }, { "status": "affected", "version": "8.10.182.0" }, { "status": "affected", "version": "8.10.161.0" }, { "status": "affected", "version": "8.10.170.0" }, { "status": "affected", "version": "8.10.183.0" }, { "status": "affected", "version": "8.10.162.0" }, { "status": "affected", "version": "8.10.185.0" } ] }, { "product": "Cisco Business Wireless Access Point Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "10.0.1.0" }, { "status": "affected", "version": "10.0.2.0" }, { "status": "affected", "version": "10.1.1.0" }, { "status": "affected", "version": "10.1.2.0" }, { "status": "affected", "version": "10.2.1.0" }, { "status": "affected", "version": "10.2.2.0" }, { "status": "affected", "version": "10.3.1.0" }, { "status": "affected", "version": "10.3.1.1" }, { "status": "affected", "version": "10.3.2.0" }, { "status": "affected", "version": "10.4.1.0" }, { "status": "affected", "version": "10.4.2.0" }, { "status": "affected", "version": "10.6.1.0" }, { "status": "affected", "version": "10.6.2.0" }, { "status": "affected", "version": "10.7.1.0" }, { "status": "affected", "version": "10.8.1.0" }, { "status": "affected", "version": "10.5.2.0" } ] }, { "product": "Cisco Aironet Access Point Software (IOS XE Controller)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "16.10.1e" }, { "status": "affected", "version": "16.10.1" }, { "status": "affected", "version": "17.1.1t" }, { "status": "affected", "version": "17.1.1s" }, { "status": "affected", "version": "17.1.1" }, { "status": "affected", "version": "16.11.1a" }, { "status": "affected", "version": "16.11.1" }, { "status": "affected", "version": "16.11.1c" }, { "status": "affected", "version": "16.11.1b" }, { "status": "affected", "version": "16.12.1s" }, { "status": "affected", "version": "16.12.4" }, { "status": "affected", "version": "16.12.1" }, { "status": "affected", "version": "16.12.2s" }, { "status": "affected", "version": "16.12.1t" }, { "status": "affected", "version": "16.12.4a" }, { "status": "affected", "version": "16.12.5" }, { "status": "affected", "version": "16.12.3" }, { "status": "affected", "version": "16.12.6" }, { "status": "affected", "version": "16.12.8" }, { "status": "affected", "version": "16.12.7" }, { "status": "affected", "version": "16.12.6a" }, { "status": "affected", "version": "17.3.1" }, { "status": "affected", "version": "17.3.2a" }, { "status": "affected", "version": "17.3.3" }, { "status": "affected", "version": "17.3.4" }, { "status": "affected", "version": "17.3.5" }, { "status": "affected", "version": "17.3.2" }, { "status": "affected", "version": "17.3.4c" }, { "status": "affected", "version": "17.3.5a" }, { "status": "affected", "version": "17.3.5b" }, { "status": "affected", "version": "17.3.6" }, { "status": "affected", "version": "17.2.1" }, { "status": "affected", "version": "17.2.1a" }, { "status": "affected", "version": "17.2.3" }, { "status": "affected", "version": "17.2.2" }, { "status": "affected", "version": "17.5.1" }, { "status": "affected", "version": "17.4.1" }, { "status": "affected", "version": "17.4.2" }, { "status": "affected", "version": "17.6.1" }, { "status": "affected", "version": "17.6.2" }, { "status": "affected", "version": "17.6.3" }, { "status": "affected", "version": "17.6.4" }, { "status": "affected", "version": "17.6.5" }, { "status": "affected", "version": "17.6.6a" }, { "status": "affected", "version": "17.6.5a" }, { "status": "affected", "version": "17.10.1" }, { "status": "affected", "version": "17.9.1" }, { "status": "affected", "version": "17.9.2" }, { "status": "affected", "version": "17.9.3" }, { "status": "affected", "version": "17.7.1" }, { "status": "affected", "version": "17.8.1" }, { "status": "affected", "version": "17.11.1" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker to bypass the Cisco Secure Boot functionality and load a software image that has been tampered with on an affected device.\r\n\r This vulnerability exists because unnecessary commands are available during boot time at the physical console. An attacker could exploit this vulnerability by interrupting the boot process and executing specific commands to bypass the Cisco Secure Boot validation checks and load an image that has been tampered with. This image would have been previously downloaded onto the targeted device. A successful exploit could allow the attacker to load the image once. The Cisco Secure Boot functionality is not permanently compromised." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-501", "description": "Trust Boundary Violation", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-03-27T17:03:54.505Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-ap-secureboot-bypass-zT5vJkSD", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-secureboot-bypass-zT5vJkSD" } ], "source": { "advisory": "cisco-sa-ap-secureboot-bypass-zT5vJkSD", "defects": [ "CSCwf62026" ], "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20265", "datePublished": "2024-03-27T17:03:54.505Z", "dateReserved": "2023-11-08T15:08:07.624Z", "dateUpdated": "2024-08-01T21:52:31.616Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.