Cisco IOS XE Software Wireless Controller for the Catalyst 9000 Family WPA Denial of Service (cisco-sa-wpa-dos-cXshjerc)

medium Nessus Plugin ID 144196

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, IOS-XE is affected by a Denial of Service vulnerability in the WPA2 and WPA3 security implementation of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family and could allow an unauthenticated, adjacent attacker to cause denial of service (DoS) condition on an affected device. The vulnerability is due to incorrect packet processing during the WPA2 and WPA3 authentication handshake when configured for dot1x or pre-shared key (PSK) authentication key management (AKM) with 802.11r BSS Fast Transition (FT) enabled.
An attacker could exploit this vulnerability by sending a crafted authentication packet to an affected device. A successful exploit could cause an affected device to reload, resulting in a DoS condition.

Please see the included Cisco BID and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvr69019

See Also

http://www.nessus.org/u?50813faf

http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-74268

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvr69019

Plugin Details

Severity: Medium

ID: 144196

File Name: cisco-sa-wpa-dos-cXshjerc-iosxe.nasl

Version: 1.11

Type: combined

Family: CISCO

Published: 12/14/2020

Updated: 5/3/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5.7

Temporal Score: 4.2

Vector: CVSS2#AV:A/AC:M/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2020-3429

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios_xe

Required KB Items: Host/Cisco/IOS-XE/Version, Host/Cisco/IOS-XE/Model

Exploit Ease: No known exploits are available

Patch Publication Date: 9/24/2020

Vulnerability Publication Date: 9/24/2020

Reference Information

CVE: CVE-2020-3429

CWE: 20

CISCO-SA: cisco-sa-wpa-dos-cXshjerc

IAVA: 2020-A-0439-S

CISCO-BUG-ID: CSCvr69019