CVE-2020-3262Improper Input Validation in Cisco Aironet Access Point Software

Severity
7.5HIGHNVD
EPSS
1.4%
top 19.49%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 15
Latest updateMay 24

Description

A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol handler of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the a

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

🔴Vulnerability Details

2
GHSA
GHSA-h4wq-fxpq-gmg2: A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol handler of Cisco Wireless LAN Controller (WLC) Software co2022-05-24
CVEList
Cisco Wireless LAN Controller CAPWAP Denial of Service Vulnerability2020-04-15

📋Vendor Advisories

1
Cisco
Cisco Wireless LAN Controller CAPWAP Denial of Service Vulnerability2020-04-15
CVE-2020-3262 — Improper Input Validation in Cisco | cvebase