Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-12283

EPSS 0.40% · P61
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-12283

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the handling of 802.11w Protected Management Frames (PAF) by Cisco Aironet 3800 Series Access Points could allow an unauthenticated, adjacent attacker to terminate a valid user connection to an affected device, aka Denial of Service. The vulnerability exists because the affected device does not properly validate 802.11w PAF disassociation and deauthentication frames that it receives. An attacker could exploit this vulnerability by sending a spoofed 802.11w PAF frame from a valid, authenticated client on an adjacent network to an affected device. A successful exploit could allow the attacker to terminate a single valid user connection to the affected device. This vulnerability affects Access Points that are configured to run in FlexConnect mode. Cisco Bug IDs: CSCvc20627.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
内存缓冲区边界内操作的限制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Aironet 3800 Series Access Points 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Aironet 3800 Series Access Points是美国思科(Cisco)公司的一套无线访问接入点设备。802.11w Protected Management Frames(PAF)是其中的一个帧加密保护组件。 Cisco Aironet 3800 Series Access Points中802.11w PAF的处理存在拒绝服务漏洞,该漏洞源于程序没有正确的验证接收到的802.11w PAF解除关联和解除认证帧。攻击者可借助临近网络上已认证的有效客户端向受影响的设备发送伪造
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Cisco Aironet 3800 Series Access Points Cisco Aironet 3800 Series Access Points -

II. Public POCs for CVE-2017-12283

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-12283

登录查看更多情报信息。

Same Patch Batch · n/a · 2017-11-02 · 17 CVEs total

CVE-2017-12243多款Cisco产品命令注入漏洞
CVE-2017-12261多款Cisco产品权限许可和访问控制漏洞
CVE-2017-12262Cisco Application Policy Infrastructure Controller Enterprise Module 安全漏洞
CVE-2017-12273Cisco Aironet 1560、2800和3800 Series Access Points 安全漏洞
CVE-2017-12274Cisco Aironet 1560、2800和3800 Series Access Points 安全漏洞
CVE-2017-12275Cisco Wireless LAN Controller 安全漏洞
CVE-2017-12276Cisco Prime Collaboration Provisioning应用程序安全漏洞
CVE-2017-12277Cisco Firepower 4100 Series Next-Generation Firewall和Cisco Firepower 9300 Security Applian
CVE-2017-12278Cisco Wireless LAN Controller Simple Network Management Protocol子系统安全漏洞
CVE-2017-12279Cisco Aironet Access Points IOS Software 信息泄露漏洞
CVE-2017-12280Cisco Wireless LAN Controller 安全漏洞
CVE-2017-12281Cisco Aironet 1800、2800和3800 Series Access Points 安全漏洞
CVE-2017-12282Cisco Wireless LAN Controller 安全漏洞
CVE-2017-12294Cisco WebEx Meetings Server 跨站脚本漏洞
CVE-2017-12295Cisco WebEx Meetings Server 信息泄露漏洞
CVE-2017-16510WordPress SQL注入漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2017-12283

No comments yet


Leave a comment