CVE-2024-20271
27.03.2024, 17:15
A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | ios_xe | 𝑥 < 17.3.8 |
cisco | ios_xe | 17.4 ≤ 𝑥 < 17.6.6 |
cisco | ios_xe | 17.7 ≤ 𝑥 < 17.9.5 |
cisco | ios_xe | 17.10 ≤ 𝑥 < 17.12.2 |
cisco | business_access_points | 𝑥 < 10.9.1.0 |
cisco | business_access_points | 𝑥 < 10.6.2.0 |
cisco | wireless_lan_controller_software | 𝑥 < 8.10.190.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration