Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-1439

Опубликовано: 24 мар. 2021
Источник: nvd
CVSS3: 7.4
CVSS2: 3.3
EPSS Низкий

Описание

A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of incoming mDNS traffic. An attacker could exploit this vulnerability by sending a crafted mDNS packet to an affected device through a wireless network that is configured in FlexConnect local switching mode or through a wired network on a configured mDNS VLAN. A successful exploit could allow the attacker to cause the access point (AP) to reboot, resulting in a DoS condition.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:a:cisco:aironet_access_point_software:-:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1540:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:cisco:catalyst_9800_firmware:*:*:*:*:*:*:*:*
Версия от 17.1 (включая) до 17.3.3 (исключая)
cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*

EPSS

Процентиль: 29%
0.00107
Низкий

7.4 High

CVSS3

3.3 Low

CVSS2

Дефекты

CWE-120

Связанные уязвимости

CVSS3: 7.4
github
больше 3 лет назад

A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of incoming mDNS traffic. An attacker could exploit this vulnerability by sending a crafted mDNS packet to an affected device through a wireless network that is configured in FlexConnect local switching mode or through a wired network on a configured mDNS VLAN. A successful exploit could allow the attacker to cause the access point (AP) to reboot, resulting in a DoS condition.

CVSS3: 7.4
fstec
почти 5 лет назад

Уязвимость функции шлюза многоадресной передачи DNS (mDNS) микропрограммного обеспечения точек доступа Cisco Aironet Access Points, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 29%
0.00107
Низкий

7.4 High

CVSS3

3.3 Low

CVSS2

Дефекты

CWE-120