This script is Copyright (C) 2002-2014 Tenable Network Security, Inc.
The remote wireless access point has a denial of service
The remote host appears to be a Cisco Aironet wireless access point.
It was possible to reboot the AP by connecting via telnet and and
providing a specially crafted username and password. A remote attacker
could do this repeatedly to disable the device.
See also :
Update to release 11.21, or disable telnet.
Risk factor :
High / CVSS Base Score : 7.8
CVSS Temporal Score : 6.3
Public Exploit Available : false
Nessus Plugin ID: 11014 (cisco_aironet_dos.nasl)
Bugtraq ID: 4461
CVE ID: CVE-2002-0545
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.