Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-1615


A vulnerability in the packet processing functionality of Cisco Embedded Wireless Controller (EWC) Software for Catalyst Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected AP. This vulnerability is due to insufficient buffer allocation. An attacker could exploit this vulnerability by sending crafted traffic to an affected device. A successful exploit could allow the attacker to exhaust available resources and cause a DoS condition on an affected AP, as well as a DoS condition for client traffic traversing the AP.


Published

2021-09-23T03:15:12.470

Last Modified

2024-11-21T05:44:44.683

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.6 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

2.9

Weaknesses
  • Type: Secondary
    CWE-410
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco embedded_wireless_controller ≤ 17.6.1 Yes
Hardware cisco catalyst_9105 - No
Hardware cisco catalyst_9115 - No
Hardware cisco catalyst_9117 - No
Hardware cisco catalyst_9120 - No
Hardware cisco catalyst_9124 - No
Hardware cisco catalyst_9130 - No

References