Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jqh5-88rr-f29q

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 4.7

Описание

A vulnerability in the handling of IEEE 802.11w Protected Management Frames (PMFs) of Cisco Catalyst 9800 Series Wireless Controllers that are running Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to terminate a valid user connection to an affected device. The vulnerability exists because the affected software does not properly validate 802.11w disassociation and deauthentication PMFs that it receives. An attacker could exploit this vulnerability by sending a spoofed 802.11w PMF from a valid, authenticated client on a network adjacent to an affected device. A successful exploit could allow the attacker to terminate a single valid user connection to the affected device.

A vulnerability in the handling of IEEE 802.11w Protected Management Frames (PMFs) of Cisco Catalyst 9800 Series Wireless Controllers that are running Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to terminate a valid user connection to an affected device. The vulnerability exists because the affected software does not properly validate 802.11w disassociation and deauthentication PMFs that it receives. An attacker could exploit this vulnerability by sending a spoofed 802.11w PMF from a valid, authenticated client on a network adjacent to an affected device. A successful exploit could allow the attacker to terminate a single valid user connection to the affected device.

EPSS

Процентиль: 33%
0.00133
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 4.7
nvd
больше 5 лет назад

A vulnerability in the handling of IEEE 802.11w Protected Management Frames (PMFs) of Cisco Catalyst 9800 Series Wireless Controllers that are running Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to terminate a valid user connection to an affected device. The vulnerability exists because the affected software does not properly validate 802.11w disassociation and deauthentication PMFs that it receives. An attacker could exploit this vulnerability by sending a spoofed 802.11w PMF from a valid, authenticated client on a network adjacent to an affected device. A successful exploit could allow the attacker to terminate a single valid user connection to the affected device.

CVSS3: 4.7
fstec
больше 5 лет назад

Уязвимость компонента IEEE 802.11w Protected Management Frames (PMFs) операционной системы Cisco IOS XE, позволяющая нарушителю разорвать действительное подключение пользователя к уязвимому устройству

EPSS

Процентиль: 33%
0.00133
Низкий

4.7 Medium

CVSS3

Дефекты

CWE-20