漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A vulnerability in 802.11 association request frame processing for the Cisco Aironet 1560, 2800, and 3800 Series Access Points could allow an unauthenticated, Layer 2 radio frequency (RF) adjacent attacker to cause the Access Point (AP) to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient frame validation of the 802.11 association request. An attacker could exploit this vulnerability by sending a malformed 802.11 association request to the targeted device. An exploit could allow the attacker to cause the AP to reload, resulting in a DoS condition while the AP is reloading. This vulnerability affects the following Cisco products running either the Lightweight AP Software or Mobility Express image: Aironet 1560 Series Access Points, Aironet 2800 Series Access Points, Aironet 3800 Series Access Points. Note: The Cisco Aironet 1560 Series Access Point device is supported as of release 8.3.112.0. Cisco Bug IDs: CSCve12189.
漏洞信息
N/A
漏洞
输入验证不恰当
漏洞
Cisco Aironet 1560、2800和3800 Series Access Points 安全漏洞
漏洞信息
Cisco Aironet 1560、2800和3800 Series Access Points都是美国思科(Cisco)公司的路由器接入设备。 Cisco Aironet 1560、2800和3800 Series Access Points中的802.11 association request frame处理存在拒绝服务漏洞,该漏洞源于程序没有正确的验证802.11关联请求中的帧。攻击者可通过向目标设备发送畸形的802.11关联请求利用该漏洞造成拒绝服务(重新加载)。
漏洞信息
N/A
漏洞
N/A