Логотип exploitDog
bind:CVE-2021-1615
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-1615

Количество 3

Количество 3

nvd логотип

CVE-2021-1615

около 4 лет назад

A vulnerability in the packet processing functionality of Cisco Embedded Wireless Controller (EWC) Software for Catalyst Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected AP. This vulnerability is due to insufficient buffer allocation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to exhaust available resources and cause a DoS condition on an affected AP, as well as a DoS condition for client traffic traversing the AP.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-25r3-37cq-xj9m

больше 3 лет назад

A vulnerability in the packet processing functionality of Cisco Embedded Wireless Controller (EWC) Software for Catalyst Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected AP. This vulnerability is due to insufficient buffer allocation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to exhaust available resources and cause a DoS condition on an affected AP, as well as a DoS condition for client traffic traversing the AP.

CVSS3: 8.6
EPSS: Низкий
fstec логотип

BDU:2021-05979

около 4 лет назад

Уязвимость функции обработки пакетов программного обеспечения встроенного контроллера беспроводной связи Cisco (EWC), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-1615

A vulnerability in the packet processing functionality of Cisco Embedded Wireless Controller (EWC) Software for Catalyst Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected AP. This vulnerability is due to insufficient buffer allocation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to exhaust available resources and cause a DoS condition on an affected AP, as well as a DoS condition for client traffic traversing the AP.

CVSS3: 8.6
0%
Низкий
около 4 лет назад
github логотип
GHSA-25r3-37cq-xj9m

A vulnerability in the packet processing functionality of Cisco Embedded Wireless Controller (EWC) Software for Catalyst Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected AP. This vulnerability is due to insufficient buffer allocation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to exhaust available resources and cause a DoS condition on an affected AP, as well as a DoS condition for client traffic traversing the AP.

CVSS3: 8.6
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-05979

Уязвимость функции обработки пакетов программного обеспечения встроенного контроллера беспроводной связи Cisco (EWC), позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
0%
Низкий
около 4 лет назад

Уязвимостей на страницу