6.8
CVE-2019-1826
- EPSS 0.13%
- Veröffentlicht 18.04.2019 02:29:05
- Zuletzt bearbeitet 21.11.2024 04:37:28
- Quelle psirt@cisco.com
- CVE-Watchlists
- Unerledigt
A vulnerability in the quality of service (QoS) feature of Cisco Aironet Series Access Points (APs) could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation on QoS fields within Wi-Fi frames by the affected device. An attacker could exploit this vulnerability by sending malformed Wi-Fi frames to an affected device. A successful exploit could allow the attacker to cause the affected device to crash, resulting in a DoS condition.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Aironet Access Point Firmware Version-
Cisco ≫ Aironet 1562d Version-
Cisco ≫ Aironet 1562e Version-
Cisco ≫ Aironet 1562i Version-
Cisco ≫ Aironet 2800e Version-
Cisco ≫ Aironet 2800i Version-
Cisco ≫ Aironet 3800e Version-
Cisco ≫ Aironet 3800i Version-
Cisco ≫ Aironet 3800p Version-
Cisco ≫ Aironet 4800 Version-
Cisco ≫ Aironet 1562e Version-
Cisco ≫ Aironet 1562i Version-
Cisco ≫ Aironet 2800e Version-
Cisco ≫ Aironet 2800i Version-
Cisco ≫ Aironet 3800e Version-
Cisco ≫ Aironet 3800i Version-
Cisco ≫ Aironet 3800p Version-
Cisco ≫ Aironet 4800 Version-
Cisco ≫ Aironet Access Point Firmware Version8.5(131.3)
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.13% | 0.335 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.7 | 2.1 | 3.6 |
CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
|
| nvd@nist.gov | 5.5 | 5.1 | 6.9 |
AV:A/AC:L/Au:S/C:N/I:N/A:C
|
| psirt@cisco.com | 6.8 | 2.3 | 4 |
CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.