Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-15261

Опубликовано: 16 окт. 2019
Источник: nvd
CVSS3: 8.6
CVSS3: 8.6
CVSS2: 7.8
EPSS Низкий

Описание

A vulnerability in the Point-to-Point Tunneling Protocol (PPTP) VPN packet processing functionality in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Generic Routing Encapsulation (GRE) frames that pass through the data plane of an affected AP. An attacker could exploit this vulnerability by associating to a vulnerable AP, initiating a PPTP VPN connection to an arbitrary PPTP VPN server, and sending a malicious GRE frame through the data plane of the AP. A successful exploit could allow the attacker to cause an internal process of the targeted AP to crash, which in turn would cause the AP to reload. The AP reload would cause a DoS condition for clients that are associated with the AP.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:cisco:aironet_1810_firmware:*:*:*:*:*:*:*:*
Версия от 8.4 (включая) до 8.5.151.0 (исключая)
cpe:2.3:o:cisco:aironet_1810_firmware:*:*:*:*:*:*:*:*
Версия от 8.8 (включая) до 8.8.125.0 (исключая)
cpe:2.3:o:cisco:aironet_1810_firmware:*:*:*:*:*:*:*:*
Версия от 8.9 (включая) до 8.9.111.0 (исключая)
cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

Одно из

cpe:2.3:o:cisco:aironet_1830_firmware:*:*:*:*:*:*:*:*
Версия от 8.4 (включая) до 8.5.151.0 (исключая)
cpe:2.3:o:cisco:aironet_1830_firmware:*:*:*:*:*:*:*:*
Версия от 8.8 (включая) до 8.8.125.0 (исключая)
cpe:2.3:o:cisco:aironet_1830_firmware:*:*:*:*:*:*:*:*
Версия от 8.9 (включая) до 8.9.111.0 (исключая)
cpe:2.3:h:cisco:aironet_1830:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

Одно из

cpe:2.3:o:cisco:aironet_1850_firmware:*:*:*:*:*:*:*:*
Версия от 8.4 (включая) до 8.5.151.0 (исключая)
cpe:2.3:o:cisco:aironet_1850_firmware:*:*:*:*:*:*:*:*
Версия от 8.8 (включая) до 8.8.125.0 (исключая)
cpe:2.3:o:cisco:aironet_1850_firmware:*:*:*:*:*:*:*:*
Версия от 8.9 (включая) до 8.9.111.0 (исключая)
cpe:2.3:h:cisco:aironet_1850:-:*:*:*:*:*:*:*

EPSS

Процентиль: 80%
0.01447
Низкий

8.6 High

CVSS3

8.6 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-20
CWE-20

Связанные уязвимости

CVSS3: 8.6
github
больше 3 лет назад

A vulnerability in the Point-to-Point Tunneling Protocol (PPTP) VPN packet processing functionality in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Generic Routing Encapsulation (GRE) frames that pass through the data plane of an affected AP. An attacker could exploit this vulnerability by associating to a vulnerable AP, initiating a PPTP VPN connection to an arbitrary PPTP VPN server, and sending a malicious GRE frame through the data plane of the AP. A successful exploit could allow the attacker to cause an internal process of the targeted AP to crash, which in turn would cause the AP to reload. The AP reload would cause a DoS condition for clients that are associated with the AP.

CVSS3: 8.6
fstec
больше 6 лет назад

Уязвимость функции обработки VPN-пакетов реализации протокола PPTP (Point-to-Point Tunneling Protocol) программного обеспечения точек доступа Cisco Aironet Access Points (AP) серий 1560, 2800, 3800, 4800, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 80%
0.01447
Низкий

8.6 High

CVSS3

8.6 High

CVSS3

7.8 High

CVSS2

Дефекты

CWE-20
CWE-20