Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jccp-q6rh-8v47

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644.

Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644.

EPSS

Процентиль: 92%
0.07828
Низкий

Связанные уязвимости

nvd
около 20 лет назад

Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644.

EPSS

Процентиль: 92%
0.07828
Низкий