Cisco Aironet Telnet Invalid Username/Password DoS

high Nessus Plugin ID 11014

Synopsis

The remote wireless access point has a denial of service vulnerability.

Description

The remote host appears to be a Cisco Aironet wireless access point.

It was possible to reboot the AP by connecting via telnet and and providing a specially crafted username and password. A remote attacker could do this repeatedly to disable the device.

Solution

Update to release 11.21, or disable telnet.

See Also

http://www.nessus.org/u?b17a4b39

Plugin Details

Severity: High

ID: 11014

File Name: cisco_aironet_dos.nasl

Version: 1.28

Type: remote

Family: CISCO

Published: 6/5/2002

Updated: 4/11/2022

Configuration: Enable paranoid mode, Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/h:cisco:aironet_ap350:11.21

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 4/9/2002

Vulnerability Publication Date: 4/9/2004

Reference Information

CVE: CVE-2002-0545

BID: 4461