A vulnerability in the 802.11r Fast Transition feature set of Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a corruption of certain timer mechanisms triggered by specific roaming events. This corruption will eventually cause a timer crash. An attacker could exploit this vulnerability by sending malicious reassociation events multiple times to the same AP in a short period of time, causing a DoS condition on the affected AP.
2018-10-17T22:29:00.550
2024-11-21T03:38:14.210
Modified
CVSSv3.0: 7.4 (HIGH)
AV:A/AC:L/Au:N/C:N/I:N/A:C
6.5
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | cisco | access_points | 8.0\(140.0\) | Yes |
Operating System | cisco | access_points | 8.2\(141.0\) | Yes |
Operating System | cisco | access_points | 8.2\(151.0\) | Yes |
Operating System | cisco | access_points | 8.3\(102.0\) | Yes |
Operating System | cisco | access_points | 8.3\(112.0\) | Yes |
Operating System | cisco | access_points | 8.3\(114.74\) | Yes |
Operating System | cisco | access_points | 15.3\(3\)jd | Yes |
Operating System | cisco | access_points | < 8.3.140.0 | Yes |
Operating System | cisco | access_points | < 8.5.110.0 | Yes |