ID

VAR-201608-0224


CVE

CVE-2016-6361


TITLE

plural Cisco Aironet Device software Aggregated MAC Protocol Data Unit Service disruption in implementations (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-004433

DESCRIPTION

The Aggregated MAC Protocol Data Unit (AMPDU) implementation on Cisco Aironet 1800, 2800, and 3800 devices with software before 8.2.121.0 and 8.3.x before 8.3.102.0 allows remote attackers to cause a denial of service (device reload) via a crafted AMPDU header, aka Bug ID CSCuz56288. Cisco Aironet AccessPoints is a set of wireless access point devices from Cisco. A denial of service vulnerability exists in the AggregatedMACProtocolDataUnit (AMPDU) implementation in the Cisco Aironet AccessPoints platform. An attacker could exploit the vulnerability to send a device overload by sending a specially crafted AMPDU packet. Attackers can exploit this issue to reload the affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCuz56288. Cisco Aironet 1800, 2800, and 3800 are all routers of Cisco (Cisco). The following devices and versions are affected: Cisco Aironet 1800, 2800, 3800, versions prior to 8.2.121.0 and versions 8.3.x prior to 8.3.102.0

Trust: 2.61

sources: NVD: CVE-2016-6361 // JVNDB: JVNDB-2016-004433 // CNVD: CNVD-2016-06435 // BID: 92508 // VULHUB: VHN-95181 // VULMON: CVE-2016-6361

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-06435

AFFECTED PRODUCTS

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.2\(100.0\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.1\(15.14\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.1\(112.3\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.2\(102.43\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.1\(131.0\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.1\(112.4\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.3.0

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:ltversion:8.3.x

Trust: 0.8

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.3.102.0

Trust: 0.8

vendor:ciscomodel:aironet series access pointscope:eqversion:3800

Trust: 0.6

vendor:ciscomodel:aironet series access pointscope:eqversion:2800

Trust: 0.6

vendor:ciscomodel:aironet series access pointscope:eqversion:1800

Trust: 0.6

vendor:ciscomodel:aironet series access pointsscope:eqversion:38000

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:eqversion:28000

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:eqversion:18000

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:38008.3.102.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:38008.2.121.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:28008.3.102.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:28008.2.121.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:18008.3.102.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:18008.2.121.0

Trust: 0.3

sources: CNVD: CNVD-2016-06435 // BID: 92508 // JVNDB: JVNDB-2016-004433 // CNNVD: CNNVD-201608-336 // NVD: CVE-2016-6361

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-6361
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-6361
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-06435
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201608-336
value: MEDIUM

Trust: 0.6

VULHUB: VHN-95181
value: MEDIUM

Trust: 0.1

VULMON: CVE-2016-6361
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-6361
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-06435
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-95181
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-6361
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-06435 // VULHUB: VHN-95181 // VULMON: CVE-2016-6361 // JVNDB: JVNDB-2016-004433 // CNNVD: CNNVD-201608-336 // NVD: CVE-2016-6361

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-95181 // JVNDB: JVNDB-2016-004433 // NVD: CVE-2016-6361

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201608-336

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201608-336

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004433

PATCH

title:cisco-sa-20160817-aapurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-aap

Trust: 0.8

title:Patch for CiscoAironetAccessPoints Platform Denial of Service Vulnerability (CNVD-2016-06435)url:https://www.cnvd.org.cn/patchInfo/show/80566

Trust: 0.6

title:Cisco Aironet 1800 , 2800 and 3800 Repair measures for platform denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63702

Trust: 0.6

title:Cisco: Cisco Aironet 1800, 2800, and 3800 Series Access Point Platforms AMPDU Denial of Service Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20160817-aap

Trust: 0.1

sources: CNVD: CNVD-2016-06435 // VULMON: CVE-2016-6361 // JVNDB: JVNDB-2016-004433 // CNNVD: CNNVD-201608-336

EXTERNAL IDS

db:NVDid:CVE-2016-6361

Trust: 3.5

db:BIDid:92508

Trust: 2.7

db:SECTRACKid:1036648

Trust: 1.2

db:JVNDBid:JVNDB-2016-004433

Trust: 0.8

db:CNNVDid:CNNVD-201608-336

Trust: 0.7

db:CNVDid:CNVD-2016-06435

Trust: 0.6

db:NSFOCUSid:34591

Trust: 0.6

db:VULHUBid:VHN-95181

Trust: 0.1

db:VULMONid:CVE-2016-6361

Trust: 0.1

sources: CNVD: CNVD-2016-06435 // VULHUB: VHN-95181 // VULMON: CVE-2016-6361 // BID: 92508 // JVNDB: JVNDB-2016-004433 // CNNVD: CNNVD-201608-336 // NVD: CVE-2016-6361

REFERENCES

url:http://www.securityfocus.com/bid/92508

Trust: 2.4

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160817-aap

Trust: 2.2

url:http://www.securitytracker.com/id/1036648

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6361

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6361

Trust: 0.8

url:http://www.nsfocus.net/vulndb/34591

Trust: 0.6

url:http://www.cisco.com/cisco/web/solutions/small_business/products/wireless/aironet_series_access_points/index.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2016-06435 // VULHUB: VHN-95181 // VULMON: CVE-2016-6361 // BID: 92508 // JVNDB: JVNDB-2016-004433 // CNNVD: CNNVD-201608-336 // NVD: CVE-2016-6361

CREDITS

Cisco

Trust: 0.9

sources: BID: 92508 // CNNVD: CNNVD-201608-336

SOURCES

db:CNVDid:CNVD-2016-06435
db:VULHUBid:VHN-95181
db:VULMONid:CVE-2016-6361
db:BIDid:92508
db:JVNDBid:JVNDB-2016-004433
db:CNNVDid:CNNVD-201608-336
db:NVDid:CVE-2016-6361

LAST UPDATE DATE

2024-11-23T23:09:11.783000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-06435date:2016-08-19T00:00:00
db:VULHUBid:VHN-95181date:2016-12-12T00:00:00
db:VULMONid:CVE-2016-6361date:2016-12-12T00:00:00
db:BIDid:92508date:2016-08-17T00:00:00
db:JVNDBid:JVNDB-2016-004433date:2016-08-23T00:00:00
db:CNNVDid:CNNVD-201608-336date:2016-08-23T00:00:00
db:NVDid:CVE-2016-6361date:2024-11-21T02:55:58.763

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-06435date:2016-08-22T00:00:00
db:VULHUBid:VHN-95181date:2016-08-22T00:00:00
db:VULMONid:CVE-2016-6361date:2016-08-22T00:00:00
db:BIDid:92508date:2016-08-17T00:00:00
db:JVNDBid:JVNDB-2016-004433date:2016-08-23T00:00:00
db:CNNVDid:CNNVD-201608-336date:2016-08-18T00:00:00
db:NVDid:CVE-2016-6361date:2016-08-22T10:59:10.043