SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Cisco Aironet Vendors:   Cisco
Cisco Aironet 3800 Series 802.11w PAF Validation Flaw Lets Remote Users Deny Service
SecurityTracker Alert ID:  1039718
SecurityTracker URL:  http://securitytracker.com/id/1039718
CVE Reference:   CVE-2017-12283   (Links to External Site)
Date:  Nov 2 2017
Impact:   Denial of service via network
Vendor Confirmed:  Yes  
Version(s): 3800 Series
Description:   A vulnerability was reported in Cisco Aironet 3800 Series Access Points. A remote user can cause denial of service conditions on the target system.

The system does not properly validate 802.11w Protected Management Frames (PAF) disassociation and deauthentication frames. A remote user on the local network can send specially crafted spoofed 802.11w PAF data to cause the target user connection to be terminated.

Systems configured to run in FlexConnect mode are affected.

The vendor has assigned bug ID CSCvc20627 to this vulnerability.

Impact:   A remote user on the local network can cause the target user connection to be terminated.
Solution:   No solution was available at the time of this entry.

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet4

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet4 (Links to External Site)
Cause:   Input validation error

Message History:   None.


 Source Message Contents

Subject:  https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-aironet4

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC