A vulnerability in 802.11 ingress packet processing of the Cisco Mobility Express 2800 and 3800 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause the connection table to be full of invalid connections and be unable to process new incoming requests.

The vulnerability is due to lack of proper error handling when the 802.11 frame is received with an unexpected status code.

An attacker could exploit this vulnerability by sending a crafted 802.11 frame to the targeted device.

An exploit could allow the attacker to impact the availability of the device due to the connection table being filled with invalid connections.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-cme1
A vulnerability in 802.11 ingress packet processing of the Cisco Mobility Express 2800 and 3800 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause the connection table to be full of invalid connections and be unable to process new incoming requests.

The vulnerability is due to lack of proper error handling when the 802.11 frame is received with an unexpected status code.

An attacker could exploit this vulnerability by sending a crafted 802.11 frame to the targeted device.

An exploit could allow the attacker to impact the availability of the device due to the connection table being filled with invalid connections.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170118-cme1

Security Impact Rating: Medium

CVE: CVE-2016-9220

Leave a Reply