CVE编号
CVE-2020-3552利用情况
暂无补丁情况
N/A披露时间
2020-09-25漏洞描述
Cisco Aironet接入点(AP)软件的以太网数据包处理中的漏洞可能允许未经身份验证的相邻攻击者在受影响的设备上导致拒绝服务(DoS)状态。该漏洞是由于输入验证不足所致。攻击者可以通过以有线客户端身份连接到受影响设备的以太网接口,并在短时间内发送一系列特定数据包来利用此漏洞。成功利用此漏洞可能使攻击者导致对NULL指针的访问,从而导致受影响设备的重新加载。解决建议
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ethport-dos-xtjTt8pY
参考链接 |
|
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-s... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | cisco | aironet_access_point_software | 8.10(1.255) | - | |||||
运行在以下环境 | |||||||||
应用 | cisco | business_access_points | * |
From (including) 10.0 |
Up to (excluding) 10.1.1.0 |
||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | tiff | * |
Up to (excluding) 4.2.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | alpine_edge | tiff | * |
Up to (excluding) 4.2.0-r0 |
|||||
运行在以下环境 | |||||||||
系统 | centos_8 | libtiff-debuginfo | * |
Up to (excluding) 4.0.9-20.el8 |
|||||
运行在以下环境 | |||||||||
系统 | cisco | access_points | * |
Up to (excluding) 16.12.4a |
|||||
运行在以下环境 | |||||||||
系统 | cisco | wireless_lan_controller | * |
Up to (excluding) 8.5.161.0 |
|||||
运行在以下环境 | |||||||||
系统 | cisco | wireless_lan_controller | * |
From (including) 8.6 |
Up to (excluding) 8.10.105.0 |
||||
运行在以下环境 | |||||||||
系统 | debian_10 | tiff | * |
Up to (excluding) 4.1.0+git191117-2~deb10u2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | tiff | * |
Up to (excluding) 4.0.8-2+deb9u5 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_33 | tiff | * |
Up to (excluding) 4.1.0-8.fc33 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | libtiff5-32bit | * |
Up to (excluding) 4.0.9-45.5.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.4 | libtiff5-32bit | * |
Up to (excluding) 4.0.9-45.5.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * |
Up to (excluding) 4.0.9-20.el8 |
|||||
运行在以下环境 | |||||||||
系统 | redhat_8 | libtiff-debuginfo | * |
Up to (excluding) 4.0.9-20.el8 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | libtiff5-32bit | * |
Up to (excluding) 4.0.9-44.45.1 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04_lts | tiff | * |
Up to (excluding) 4.0.6-1ubuntu0.8 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04_lts | tiff | * |
Up to (excluding) 4.0.9-5ubuntu0.4 |
|||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_1542d | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_1542i | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_1562d | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_1562e | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_1562i | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_1810 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_1815 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_1830e | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_1830i | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_1840 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_1850e | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_1850i | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_2800e | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_2800i | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_3800e | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_3800i | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_3800p | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | aironet_4800 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | catalyst_9800-40 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | catalyst_9800-80 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | catalyst_9800-cl | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | catalyst_9800-l | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | catalyst_9800-l-c | - | - | |||||
运行在以下环境 | |||||||||
硬件 | cisco | catalyst_9800-l-f | - | - | |||||
- 攻击路径 相邻
- 攻击复杂度 低
- 权限要求 无
- 影响范围 已更改
- 用户交互 无
- 可用性 高
- 保密性 无
- 完整性 无
还没有评论,来说两句吧...