Vulnerability Details : CVE-2021-34740
A vulnerability in the WLAN Control Protocol (WCP) implementation for Cisco Aironet Access Point (AP) software could allow an unauthenticated, adjacent attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to incorrect error handling when an affected device receives an unexpected 802.11 frame. An attacker could exploit this vulnerability by sending certain 802.11 frames over the wireless network to an interface on an affected AP. A successful exploit could allow the attacker to cause a packet buffer leak. This could eventually result in buffer allocation failures, which would trigger a reload of the affected device.
Vulnerability category: Denial of service
Products affected by CVE-2021-34740
- cpe:2.3:o:cisco:aironet_access_point_software:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_access_point_software:17.2:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:aironet_access_point_software:17.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-34740
0.06%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 25 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-34740
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.1
|
MEDIUM | AV:A/AC:L/Au:N/C:N/I:N/A:C |
6.5
|
6.9
|
NIST | |
7.4
|
HIGH | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
2.8
|
4.0
|
Cisco Systems, Inc. | |
7.4
|
HIGH | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
2.8
|
4.0
|
NIST |
CWE ids for CVE-2021-34740
-
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.Assigned by:
- nvd@nist.gov (Primary)
- ykramarz@cisco.com (Secondary)
References for CVE-2021-34740
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-airo-wpa-pktleak-dos-uSTyGrL
Cisco Aironet Access Points WLAN Control Protocol Packet Buffer Leak Denial of Service VulnerabilityVendor Advisory
Jump to