Product:

Aironet_ap1100

(Cisco)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 4
Date Id Summary Products Score Patch Annotated
2012-08-06 CVE-2012-1350 Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426. Aironet_1040, Aironet_1140, Aironet_1260, Aironet_3500, Aironet_3600, Aironet_600_office_extend, Aironet_ap1100, Aironet_ap1130ag, Aironet_ap1131, Aironet_ap1200, Aironet_ap1230ag, Aironet_ap1240, Aironet_ap1240ag, Aironet_ap1300, Aironet_ap1400, Aironet_ap340, Aironet_ap350, Aironet_bridge_350, Ios N/A
2009-08-27 CVE-2009-2976 Cisco Aironet Lightweight Access Point (AP) devices send the contents of certain multicast data frames in cleartext, which allows remote attackers to discover Wireless LAN Controller MAC addresses and IP addresses, and AP configuration details, by sniffing the wireless network. Aironet_ap1100, Aironet_ap1200 N/A
2009-08-27 CVE-2009-2861 The Over-the-Air Provisioning (OTAP) functionality on Cisco Aironet Lightweight Access Point 1100 and 1200 devices does not properly implement access-point association, which allows remote attackers to spoof a controller and cause a denial of service (service outage) via crafted remote radio management (RRM) packets, aka "SkyJack" or Bug ID CSCtb56664. Aironet_ap1100, Aironet_ap1200 N/A
2006-01-22 CVE-2006-0354 Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644. Aironet_ap1100, Aironet_ap1130ag, Aironet_ap1200, Aironet_ap1230ag, Aironet_ap1240ag, Aironet_ap1300, Aironet_ap1400, Aironet_ap350 N/A