ID

VAR-200312-0516


TITLE

Cisco Aironet AP SNMP trap leaks WEP key vulnerability

Trust: 0.6

sources: CNVD: CNVD-2003-3517

DESCRIPTION

Cisco Aironet Access Points are wireless access points.  Vulnerabilities in Cisco Aironet Access Points when running Cisco IOS could result in the disclosure of WEP key information.  When the 'snmp-server enable traps wlan-wep' command is set on Cisco Aironet Access Points, AP devices running Cisco IOS software will send WEP keys to the SNMP server in clear text. The affected hardware models include the Cisco Aironet 1100, 1200, and 1400 series. This command is disabled by default. The Cisco Aironet AP model running VxWorks is not affected by this vulnerability.  To determine whether the AP is running Cisco IOS software, as long as the telnet AP address is displayed, if it is simply provided such as apl200% instead of a graphical interface, it indicates that the IOS software is running

Trust: 0.9

sources: CNVD: CNVD-2003-3517 // IVD: 7d70f6f1-463f-11e9-875e-000c29342cb1 // IVD: 6a2e8930-203c-11e6-abef-000c29c66e3d

IOT TAXONOMY

category:['IoT', 'ICS']sub_category: -

Trust: 0.6

category:['ICS']sub_category: -

Trust: 0.4

sources: IVD: 7d70f6f1-463f-11e9-875e-000c29342cb1 // IVD: 6a2e8930-203c-11e6-abef-000c29c66e3d // CNVD: CNVD-2003-3517

AFFECTED PRODUCTS

vendor:nonemodel: - scope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2003-3517

CVSS

SEVERITY

CVSSV2

CVSSV3

IVD: 7d70f6f1-463f-11e9-875e-000c29342cb1
value: HIGH

Trust: 0.2

IVD: 6a2e8930-203c-11e6-abef-000c29c66e3d
value: LOW

Trust: 0.2

IVD: 7d70f6f1-463f-11e9-875e-000c29342cb1
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.9 [IVD]

Trust: 0.2

IVD: 6a2e8930-203c-11e6-abef-000c29c66e3d
severity: NONE
baseScore: NONE
vectorString: NONE
accessVector: NONE
accessComplexity: NONE
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: UNKNOWN

Trust: 0.2

sources: IVD: 7d70f6f1-463f-11e9-875e-000c29342cb1 // IVD: 6a2e8930-203c-11e6-abef-000c29c66e3d

TYPE

Buffer overflow

Trust: 0.2

sources: IVD: 7d70f6f1-463f-11e9-875e-000c29342cb1

EXTERNAL IDS

db:CNVDid:CNVD-2003-3517

Trust: 1.0

db:IVDid:7D70F6F1-463F-11E9-875E-000C29342CB1

Trust: 0.2

db:IVDid:6A2E8930-203C-11E6-ABEF-000C29C66E3D

Trust: 0.2

sources: IVD: 7d70f6f1-463f-11e9-875e-000c29342cb1 // IVD: 6a2e8930-203c-11e6-abef-000c29c66e3d // CNVD: CNVD-2003-3517

SOURCES

db:IVDid:7d70f6f1-463f-11e9-875e-000c29342cb1
db:IVDid:6a2e8930-203c-11e6-abef-000c29c66e3d
db:CNVDid:CNVD-2003-3517

LAST UPDATE DATE

2022-05-17T02:09:32.527000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2003-3517date:2003-12-09T00:00:00

SOURCES RELEASE DATE

db:IVDid:7d70f6f1-463f-11e9-875e-000c29342cb1date:2003-12-02T00:00:00
db:IVDid:6a2e8930-203c-11e6-abef-000c29c66e3ddate:2003-12-02T00:00:00
db:CNVDid:CNVD-2003-3517date:2003-12-02T00:00:00