Логотип exploitDog
bind:CVE-2025-20365
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-20365

Количество 3

Количество 3

nvd логотип

CVE-2025-20365

5 месяцев назад

A vulnerability in the IPv6 Router Advertisement (RA) packet processing of Cisco Access Point Software could allow an unauthenticated, adjacent attacker to modify the IPv6 gateway on an affected device. This vulnerability is due to a logic error in the processing of IPv6 RA packets that are received from wireless clients. An attacker could exploit this vulnerability by associating to a wireless network and sending a series of crafted IPv6 RA packets. A successful exploit could allow the attacker to temporarily change the IPv6 gateway of an affected device. This could also lead to intermittent packet loss for any wireless clients that are associated with the affected device.

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-g88p-ppwj-3qff

5 месяцев назад

A vulnerability in the IPv6 Router Advertisement (RA) packet processing of Cisco Access Point Software could allow an unauthenticated, adjacent attacker to modify the IPv6 gateway on an affected device. This vulnerability is due to a logic error in the processing of IPv6 RA packets that are received from wireless clients. An attacker could exploit this vulnerability by associating to a wireless network and sending a series of crafted IPv6 RA packets. A successful exploit could allow the attacker to temporarily change the IPv6 gateway of an affected device. This could also lead to intermittent packet loss for any wireless clients that are associated with the affected device.

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2025-11736

5 месяцев назад

Уязвимость управления микропрограммного обеспечения маршрутизаторов Cisco Wireless Access Points, связанная с недостаточной проверкой источника канала связи, позволяющая нарушителю изменить шлюз IPv6 на уязвимом устройстве

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-20365

A vulnerability in the IPv6 Router Advertisement (RA) packet processing of Cisco Access Point Software could allow an unauthenticated, adjacent attacker to modify the IPv6 gateway on an affected device. This vulnerability is due to a logic error in the processing of IPv6 RA packets that are received from wireless clients. An attacker could exploit this vulnerability by associating to a wireless network and sending a series of crafted IPv6 RA packets. A successful exploit could allow the attacker to temporarily change the IPv6 gateway of an affected device. This could also lead to intermittent packet loss for any wireless clients that are associated with the affected device.

CVSS3: 4.3
0%
Низкий
5 месяцев назад
github логотип
GHSA-g88p-ppwj-3qff

A vulnerability in the IPv6 Router Advertisement (RA) packet processing of Cisco Access Point Software could allow an unauthenticated, adjacent attacker to modify the IPv6 gateway on an affected device. This vulnerability is due to a logic error in the processing of IPv6 RA packets that are received from wireless clients. An attacker could exploit this vulnerability by associating to a wireless network and sending a series of crafted IPv6 RA packets. A successful exploit could allow the attacker to temporarily change the IPv6 gateway of an affected device. This could also lead to intermittent packet loss for any wireless clients that are associated with the affected device.

CVSS3: 4.3
0%
Низкий
5 месяцев назад
fstec логотип
BDU:2025-11736

Уязвимость управления микропрограммного обеспечения маршрутизаторов Cisco Wireless Access Points, связанная с недостаточной проверкой источника канала связи, позволяющая нарушителю изменить шлюз IPv6 на уязвимом устройстве

CVSS3: 4.3
0%
Низкий
5 месяцев назад

Уязвимостей на страницу