Cisco Aironet Access Point Firmware 8.5.105.0

CPE Details

Cisco Aironet Access Point Firmware 8.5.105.0
8.5.105.0
2019-04-19
14h43 +00:00
2021-06-16
14h27 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:cisco:aironet_access_point_firmware:8.5.105.0:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

aironet_access_point_firmware

Version

8.5.105.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2019-1834 2019-04-18 01h20 +00:00 A vulnerability in the internal packet processing of Cisco Aironet Series Access Points (APs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected AP if the switch interface where the AP is connected has port security configured. The vulnerability exists because the AP forwards some malformed wireless client packets outside of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel. An attacker could exploit this vulnerability by sending crafted wireless packets to an affected AP. A successful exploit could allow the attacker to trigger a security violation on the adjacent switch port, which could result in a DoS condition. Note: Though the Common Vulnerability Scoring System (CVSS) score corresponds to a High Security Impact Rating (SIR), this vulnerability is considered Medium because a workaround is available and exploitation requires a specific switch configuration. There are workarounds that address this vulnerability.
7.4
High
CVE-2019-1829 2019-04-18 01h15 +00:00 A vulnerability in the CLI of Cisco Aironet Series Access Points (APs) could allow an authenticated, local attacker to gain access to the underlying Linux operating system (OS) without the proper authentication. The attacker would need valid administrator device credentials. The vulnerability is due to improper validation of user-supplied input for certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input for a CLI command. A successful exploit could allow the attacker to obtain access to the underlying Linux OS without proper authentication.
6.7
Medium