cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-20418,https://securityvulnerability.io/vulnerability/CVE-2024-20418,Command Injection Vulnerability in Cisco Unified Industrial Wireless Software Could Allow Remote Root Access,"A critical flaw has been identified in the web-based management interface of Cisco Unified Industrial Wireless Software, specifically impacting Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points. This vulnerability arises from inadequate input validation within the management interface, allowing an unauthenticated remote attacker to initiate command injection attacks. By sending specially crafted HTTP requests, an attacker could gain root privileges over the underlying operating system of the affected devices. This exposure significantly increases the risk of unauthorized access and manipulation of the device, potentially leading to widespread security breaches.",Cisco,Cisco Aironet Access Point Software (iOS Xe Controller),10,CRITICAL,0.0004299999854993075,false,true,false,true,,true,false,2024-11-06T17:15:00.000Z,4678 CVE-2024-20271,https://securityvulnerability.io/vulnerability/CVE-2024-20271,Cisco Access Point Software Vulnerability Could Lead to Denial of Service,"A vulnerability in the IP packet processing of Cisco Access Point Software allows an unauthenticated, remote attacker to exploit specific weaknesses in input validation of IPv4 packets. By sending specially crafted IPv4 packets to or through an affected device, an attacker can induce an unexpected reload of the device, resulting in a denial of service (DoS) condition. Importantly, exploitation does not require the attacker to be associated with the access point, making this a significant risk to network availability. This issue does not affect IPv6 packet processing.",Cisco,"Cisco Aironet Access Point Software,Cisco Business Wireless Access Point Software,Cisco Aironet Access Point Software (iOS Xe Controller)",8.6,HIGH,0.0004299999854993075,false,false,false,true,,false,false,2024-03-27T17:05:27.473Z,0 CVE-2024-20265,https://securityvulnerability.io/vulnerability/CVE-2024-20265,Unauthenticated Attacker Could Bypass Cisco Secure Boot Validation and Load Tampered Image on Affected Device,"A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker to bypass the Cisco Secure Boot functionality and load a software image that has been tampered with on an affected device. This vulnerability exists because unnecessary commands are available during boot time at the physical console. An attacker could exploit this vulnerability by interrupting the boot process and executing specific commands to bypass the Cisco Secure Boot validation checks and load an image that has been tampered with. This image would have been previously downloaded onto the targeted device. A successful exploit could allow the attacker to load the image once. The Cisco Secure Boot functionality is not permanently compromised.",Cisco,"Cisco iOS Xe Software,Cisco Aironet Access Point Software,Cisco Business Wireless Access Point Software,Cisco Aironet Access Point Software (iOS Xe Controller)",5.9,MEDIUM,0.0004299999854993075,false,false,false,true,,false,false,2024-03-27T17:03:54.505Z,0 CVE-2024-20354,https://securityvulnerability.io/vulnerability/CVE-2024-20354,Cisco Aironet AP Software Vulnerability Could Lead to Denial of Service,"A vulnerability in the handling of encrypted wireless frames of Cisco Aironet Access Point (AP) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability is due to incomplete cleanup of resources when dropping certain malformed frames. An attacker could exploit this vulnerability by connecting as a wireless client to an affected AP and sending specific malformed frames over the wireless connection. A successful exploit could allow the attacker to cause degradation of service to other clients, which could potentially lead to a complete DoS condition.",Cisco,"Cisco Aironet Access Point Software,Cisco Aironet Access Point Software (ios Xe Controller)",4.7,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-03-27T16:47:04.924Z,0 CVE-2023-20268,https://securityvulnerability.io/vulnerability/CVE-2023-20268,Cisco Access Point Software Uncontrolled Resource Consumption Vulnerability,"A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to exhaust resources on an affected device.  This vulnerability is due to insufficient management of resources when handling certain types of traffic. An attacker could exploit this vulnerability by sending a series of specific wireless packets to an affected device. A successful exploit could allow the attacker to consume resources on an affected device. A sustained attack could lead to the disruption of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel and intermittent loss of wireless client traffic.",Cisco,"Cisco Aironet Access Point Software,Cisco Aironet Access Point Software (iOS Xe Controller),Cisco Business Wireless Access Point Software",4.7,MEDIUM,0.0004400000034365803,false,false,false,true,,false,false,2023-09-27T18:15:00.000Z,0 CVE-2023-20176,https://securityvulnerability.io/vulnerability/CVE-2023-20176,Networking Component Vulnerability in Cisco Access Point Software,"A vulnerability in the networking component of Cisco access point software allows unauthenticated remote attackers to cause temporary service disruption. By connecting to the access point as a wireless client and transmitting excessive traffic for a prolonged duration, the attacker can exploit this weakness. This leads to the tearing down and resetting of the Datagram TLS (DTLS) session, ultimately resulting in a denial of service condition.",Cisco,"Cisco Aironet Access Point Software,Cisco Aironet Access Point Software (IOS XE Controller)",8.6,HIGH,0.001180000021122396,false,false,false,false,,false,false,2023-09-27T18:15:00.000Z,0 CVE-2022-20945,https://securityvulnerability.io/vulnerability/CVE-2022-20945,Cisco Catalyst 9100 Series Access Points Association Request Denial of Service Vulnerability,"A vulnerability in the 802.11 association frame validation of Cisco Catalyst 9100 Series Access Points (APs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of certain parameters within association request frames received by the AP. An attacker could exploit this vulnerability by sending a crafted 802.11 association request to a nearby device. An exploit could allow the attacker to unexpectedly reload the device, resulting in a DoS condition.",Cisco,Cisco Aironet Access Point Software (iOS Xe Controller),7.4,HIGH,0.0005000000237487257,false,false,false,true,,false,false,2022-09-30T19:15:00.000Z,0 CVE-2022-20728,https://securityvulnerability.io/vulnerability/CVE-2022-20728,Cisco Access Points VLAN Bypass from Native VLAN Vulnerability,"A vulnerability in the client forwarding code of multiple Cisco Access Points (APs) could allow an unauthenticated, adjacent attacker to inject packets from the native VLAN to clients within nonnative VLANs on an affected device. This vulnerability is due to a logic error on the AP that forwards packets that are destined to a wireless client if they are received on the native VLAN. An attacker could exploit this vulnerability by obtaining access to the native VLAN and directing traffic directly to the client through their MAC/IP combination. A successful exploit could allow the attacker to bypass VLAN separation and potentially also bypass any Layer 3 protection mechanisms that are deployed.",Cisco,Cisco Aironet Access Point Software (iOS Xe Controller),4.7,MEDIUM,0.0004799999878741801,false,false,false,true,,false,false,2022-09-30T19:15:00.000Z,0 CVE-2021-1439,https://securityvulnerability.io/vulnerability/CVE-2021-1439,Cisco Aironet Access Points FlexConnect Multicast DNS Denial of Service Vulnerability,"A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of incoming mDNS traffic. An attacker could exploit this vulnerability by sending a crafted mDNS packet to an affected device through a wireless network that is configured in FlexConnect local switching mode or through a wired network on a configured mDNS VLAN. A successful exploit could allow the attacker to cause the access point (AP) to reboot, resulting in a DoS condition.",Cisco,Cisco Aironet Access Point Software (iOS Xe Controller),7.4,HIGH,0.0005799999926239252,false,false,false,true,,false,false,2021-03-24T00:00:00.000Z,0