CVE-2019-1826
Published Apr 18, 2019
Last updated 5 years ago
Overview
- Description
- A vulnerability in the quality of service (QoS) feature of Cisco Aironet Series Access Points (APs) could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation on QoS fields within Wi-Fi frames by the affected device. An attacker could exploit this vulnerability by sending malformed Wi-Fi frames to an affected device. A successful exploit could allow the attacker to cause the affected device to crash, resulting in a DoS condition.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 5.7
- Impact score
- 3.6
- Exploitability score
- 2.1
- Vector string
- CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 6.9
- Exploitability score
- 5.1
- Vector string
- AV:A/AC:L/Au:S/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_access_point_firmware:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8BE299E5-8999-41D7-B424-6303D127A833" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1D717945-EE41-4D0F-86EF-90826EBE9C3E" }, { "criteria": "cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "99EAEA92-6589-4DFB-BC4B-8CBA425452D9" }, { "criteria": "cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D27AB201-342D-4517-9E05-6088598F4695" }, { "criteria": "cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "098A82FF-95F7-416A-BADD-C57CE81ACD32" }, { "criteria": "cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DD1D5813-9223-4B3F-9DE2-F3EF854FC927" }, { "criteria": "cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "10D7583E-2B61-40F1-B9A6-701DA08F8CDF" }, { "criteria": "cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "945DDBE7-6233-416B-9BEE-7029F047E298" }, { "criteria": "cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0ED89428-750C-4C26-B2A1-E3D63F8B3F44" }, { "criteria": "cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C4D8A4CB-5B80-4332-BCBC-DA18AD94D215" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_access_point_firmware:8.5\\(131.3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "40E385D0-65C6-4E42-896A-38BD6E52F3A0" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "24E47788-9B54-42C5-AD83-428B22674575" }, { "criteria": "cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A333CD0B-4729-4E64-8B52-A3F5138F5B70" } ], "operator": "OR" } ], "operator": "AND" } ]