CVE-2024-20354

Published Mar 27, 2024

Last updated 7 months ago

Overview

Description
A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition.
Source
psirt@cisco.com
NVD status
Analyzed
Products
wireless_lan_controller_software, ios_xe

Risk scores

CVSS 3.1

Type
Primary
Base score
7.4
Impact score
4
Exploitability score
2.8
Vector string
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Severity
HIGH

Weaknesses

psirt@cisco.com
CWE-460

Social media

Hype score
Not currently trending

Configurations