QID 317155
Date Published: 2022-05-16
QID 317155: Cisco Embedded Wireless Controller with Catalyst Access Points IP Flood Denial of Service (DoS) Vulnerability (cisco-sa-ap-ip-flood-dos-6hxxENVQ)
A vulnerability in IP ingress packet processing of the Cisco Embedded Wireless Controller with Catalyst Access Points Software
could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, causing a denial of service (DoS) condition.
Affected Products
Cisco devices if they are running a vulnerable release of Cisco Embedded Wireless Controller with Catalyst Access Points Software.
Note: To be vulnerable, devices must have the default configuration.
QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.
A successful exploit could allow the attacker to cause the device to reload.
Customers are advised to refer to cisco-sa-ap-ip-flood-dos-6hxxENVQ for more information.
- cisco-sa-ap-ip-flood-dos-6hxxENVQ -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ip-flood-dos-6hxxENVQ
CVEs related to QID 317155
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-ap-ip-flood-dos-6hxxENVQ |
|