Unknown
CVE-2019-15264
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)CVE-2019-15264
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol implementation of Cisco Aironet and Catalyst 9100 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to improper resource management during CAPWAP message processing. An attacker could exploit this vulnerability by sending a high volume of legitimate wireless management frames within a short time to an affected device. A successful exploit could allow the attacker to cause a device to restart unexpectedly, resulting in a DoS condition for clients associated with the AP.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- aironet 1540 firmware -,
- aironet 1560 firmware -,
- aironet 1850 firmware -,
- aironet 1850 firmware 8.10(1.139),
- aironet 1850 firmware 8.10(1.146),
- aironet 1850 firmware 8.9(1.249),
- aironet 1850 firmware 8.9(1.255),
- aironet 1850 firmware 8.9(104.24),
- aironet 1850 firmware 8.9(4.28),
- aironet 1850 firmware 8.9(4.41),
- aironet 1850 firmware 8.9(4.49),
- aironet 1850 firmware 8.9(4.55),
- aironet 1850 firmware 8.9(4.58),
- aironet 2800 firmware -,
- aironet 3800 firmware -,
- aironet 4800 firmware -,
- catalyst 9100 firmware -
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: