CVE-2019-1834
Summary
| CVE | CVE-2019-1834 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-04-18 02:29:00 UTC |
| Updated | 2019-10-09 23:48:00 UTC |
| Description | A vulnerability in the internal packet processing of Cisco Aironet Series Access Points (APs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected AP if the switch interface where the AP is connected has port security configured. The vulnerability exists because the AP forwards some malformed wireless client packets outside of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel. An attacker could exploit this vulnerability by sending crafted wireless packets to an affected AP. A successful exploit could allow the attacker to trigger a security violation on the adjacent switch port, which could result in a DoS condition. Note: Though the Common Vulnerability Scoring System (CVSS) score corresponds to a High Security Impact Rating (SIR), this vulnerability is considered Medium because a workaround is available and exploitation requires a specific switch configuration. There are workarounds that address this vulnerability. |
Risk And Classification
Problem Types: CWE-20
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Cisco | Aironet 1542d | - | All | All | All |
| Hardware | Cisco | Aironet 1542d | - | All | All | All |
| Hardware | Cisco | Aironet 1542i | - | All | All | All |
| Hardware | Cisco | Aironet 1542i | - | All | All | All |
| Hardware | Cisco | Aironet 1562d | - | All | All | All |
| Hardware | Cisco | Aironet 1562d | - | All | All | All |
| Hardware | Cisco | Aironet 1562e | - | All | All | All |
| Hardware | Cisco | Aironet 1562e | - | All | All | All |
| Hardware | Cisco | Aironet 1562i | - | All | All | All |
| Hardware | Cisco | Aironet 1562i | - | All | All | All |
| Hardware | Cisco | Aironet 1800i | - | All | All | All |
| Hardware | Cisco | Aironet 1800i | - | All | All | All |
| Hardware | Cisco | Aironet 1850e | - | All | All | All |
| Hardware | Cisco | Aironet 1850e | - | All | All | All |
| Hardware | Cisco | Aironet 1850i | - | All | All | All |
| Hardware | Cisco | Aironet 1850i | - | All | All | All |
| Hardware | Cisco | Aironet 2800e | - | All | All | All |
| Hardware | Cisco | Aironet 2800e | - | All | All | All |
| Hardware | Cisco | Aironet 2800i | - | All | All | All |
| Hardware | Cisco | Aironet 2800i | - | All | All | All |
| Hardware | Cisco | Aironet 3800e | - | All | All | All |
| Hardware | Cisco | Aironet 3800e | - | All | All | All |
| Hardware | Cisco | Aironet 3800i | - | All | All | All |
| Hardware | Cisco | Aironet 3800i | - | All | All | All |
| Hardware | Cisco | Aironet 3800p | - | All | All | All |
| Hardware | Cisco | Aironet 3800p | - | All | All | All |
| Operating System | Cisco | Aironet Access Point Firmware | All | All | All | All |
| Operating System | Cisco | Aironet Access Point Firmware | 8.5(131.0) | All | All | All |
| Operating System | Cisco | Aironet Access Point Firmware | 8.5\(131.0\) | All | All | All |
| Operating System | Cisco | Aironet Access Point Firmware | All | All | All | All |
| Operating System | Cisco | Aironet Access Point Firmware | 8.5\(131.0\) | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Malformed Request | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Cisco Aironet Series Access Points Denial of Service Vulnerability | CISCO | tools.cisco.com | Vendor Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.