Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mqfc-mw2x-x89c

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

A vulnerability in Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper processing of client packets that are sent to an affected access point (AP). An attacker could exploit this vulnerability by sending a large number of sustained client packets to the affected AP. A successful exploit could allow the attacker to cause the affected AP to crash, resulting in a DoS condition.

A vulnerability in Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper processing of client packets that are sent to an affected access point (AP). An attacker could exploit this vulnerability by sending a large number of sustained client packets to the affected AP. A successful exploit could allow the attacker to cause the affected AP to crash, resulting in a DoS condition.

EPSS

Процентиль: 54%
0.00308
Низкий

Связанные уязвимости

CVSS3: 6.5
nvd
почти 6 лет назад

A vulnerability in Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper processing of client packets that are sent to an affected access point (AP). An attacker could exploit this vulnerability by sending a large number of sustained client packets to the affected AP. A successful exploit could allow the attacker to cause the affected AP to crash, resulting in a DoS condition.

CVSS3: 7.4
fstec
почти 6 лет назад

Уязвимость программного обеспечения точек доступа Cisco Aironet Access Points (AP) серий 1540, 1800, связанная с неправильной обработкой клиентских пакетов, отправляемых на уязвимую точку доступа (AP), позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 54%
0.00308
Низкий