CVE-2021-1439

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
24/03/2021
Last modified:
07/11/2023

Description

A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of incoming mDNS traffic. An attacker could exploit this vulnerability by sending a crafted mDNS packet to an affected device through a wireless network that is configured in FlexConnect local switching mode or through a wired network on a configured mDNS VLAN. A successful exploit could allow the attacker to cause the access point (AP) to reboot, resulting in a DoS condition.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:cisco:aironet_access_point_software:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1540:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:catalyst_9800_firmware:*:*:*:*:*:*:*:* 17.1 (including) 17.3.3 (excluding)
cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*