Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-20271


A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets.


Published

2024-03-27T17:15:51.320

Last Modified

2025-08-06T13:45:24.563

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 8.6 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-20
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco ios_xe < 17.3.8 Yes
Operating System cisco ios_xe < 17.6.6 Yes
Operating System cisco ios_xe < 17.9.5 Yes
Operating System cisco ios_xe < 17.12.2 Yes
Application cisco business_access_points < 10.9.1.0 Yes
Hardware cisco business_140ac - No
Hardware cisco business_140ac_access_point - No
Hardware cisco business_141acm - No
Hardware cisco business_142acm - No
Hardware cisco business_143acm - No
Hardware cisco business_145ac - No
Hardware cisco business_145ac_access_point - No
Hardware cisco business_240ac - No
Application cisco business_access_points < 10.6.2.0 Yes
Hardware cisco business_150ax - No
Hardware cisco business_150ax_access_point - No
Hardware cisco business_151axm - No
Operating System cisco wireless_lan_controller_software < 8.10.190.0 Yes

References