Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Aironet_1850_firmware
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 4 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2020-04-15 | CVE-2020-3261 | A vulnerability in the web-based management interface of Cisco Mobility Express Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. The vulnerability is due to insufficient CSRF protections for the web-based management interface on an affected device. An attacker could exploit this vulnerability by persuading a user with an active session on an affected device to follow a malicious link. A successful exploit... | 6300_series_access_points_firmware, Aironet_1542d_firmware, Aironet_1542i_firmware, Aironet_1562d_firmware, Aironet_1562e_firmware, Aironet_1562i_firmware, Aironet_1815_firmware, Aironet_1830_firmware, Aironet_1840_firmware, Aironet_1850_firmware, Aironet_2800e_firmware, Aironet_2800i_firmware, Aironet_3800e_firmware, Aironet_3800i_firmware, Aironet_3800p_firmware, Aironet_4800_firmware, Catalyst_iw6300_firmware | N/A | ||
2020-04-15 | CVE-2020-3260 | A vulnerability in Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper processing of client packets that are sent to an affected access point (AP). An attacker could exploit this vulnerability by sending a large number of sustained client packets to the affected AP. A successful exploit could allow the attacker to cause the affected AP to... | Aironet_1542d_firmware, Aironet_1542i_firmware, Aironet_1815_firmware, Aironet_1830_firmware, Aironet_1840_firmware, Aironet_1850_firmware | N/A | ||
2019-10-16 | CVE-2019-15264 | A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol implementation of Cisco Aironet and Catalyst 9100 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to improper resource management during CAPWAP message processing. An attacker could exploit this vulnerability by sending a high volume of legitimate... | Aironet_1540_firmware, Aironet_1560_firmware, Aironet_1850_firmware, Aironet_2800_firmware, Aironet_3800_firmware, Aironet_4800_firmware, Catalyst_9100_firmware | N/A | ||
2019-10-16 | CVE-2019-15261 | A vulnerability in the Point-to-Point Tunneling Protocol (PPTP) VPN packet processing functionality in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Generic Routing Encapsulation (GRE) frames that pass through the data plane of an affected AP. An attacker could exploit this vulnerability by associating to a... | Aironet_1810_firmware, Aironet_1830_firmware, Aironet_1850_firmware | N/A |