CVE-2024-20271
CVSS V2 None
CVSS V3 None
Description
A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets.
Overview
- CVE ID
- CVE-2024-20271
- Assigner
- cisco
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-03-27T17:05:27.473Z
- Last Modified Date
- 2024-03-27T17:05:27.473Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-20271 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20271 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-26 04:46:04 | Added to TrackCVE |