CVE-2021-1439
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
24/03/2021
Last modified:
07/11/2023
Description
A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of incoming mDNS traffic. An attacker could exploit this vulnerability by sending a crafted mDNS packet to an affected device through a wireless network that is configured in FlexConnect local switching mode or through a wired network on a configured mDNS VLAN. A successful exploit could allow the attacker to cause the access point (AP) to reboot, resulting in a DoS condition.
Impact
Base Score 3.x
7.40
Severity 3.x
HIGH
Base Score 2.0
3.30
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:aironet_access_point_software:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:aironet_1540:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:catalyst_9800_firmware:*:*:*:*:*:*:*:* | 17.1 (including) | 17.3.3 (excluding) |
| cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



