QID 317155

Date Published: 2022-05-16

QID 317155: Cisco Embedded Wireless Controller with Catalyst Access Points IP Flood Denial of Service (DoS) Vulnerability (cisco-sa-ap-ip-flood-dos-6hxxENVQ)

A vulnerability in IP ingress packet processing of the Cisco Embedded Wireless Controller with Catalyst Access Points Software
could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, causing a denial of service (DoS) condition.

Affected Products
Cisco devices if they are running a vulnerable release of Cisco Embedded Wireless Controller with Catalyst Access Points Software. Note: To be vulnerable, devices must have the default configuration.

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

A successful exploit could allow the attacker to cause the device to reload.

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as High - 7.8 severity.
  • Solution

    Customers are advised to refer to cisco-sa-ap-ip-flood-dos-6hxxENVQ for more information.

    CVEs related to QID 317155

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-ap-ip-flood-dos-6hxxENVQ URL Logo tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ip-flood-dos-6hxxENVQ