CVE-2020-3552

Severity
7.4HIGH
EPSS
0.1%
top 72.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 24
Latest updateMay 24

Description

A vulnerability in the Ethernet packet handling of Cisco Aironet Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by connecting as a wired client to the Ethernet interface of an affected device and sending a series of specific packets within a short time frame. A successful exploit could allow the

CVSS vector

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 2.8 | Impact: 4.0

Affected Packages5 packages

🔴Vulnerability Details

2
GHSA
GHSA-hr95-cqm5-95mg: A vulnerability in the Ethernet packet handling of Cisco Aironet Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cau2022-05-24
CVEList
Cisco Aironet Access Points Ethernet Wired Clients Denial of Service Vulnerability2020-09-24

📋Vendor Advisories

1
Cisco
Cisco Aironet Access Points Ethernet Wired Clients Denial of Service Vulnerability2020-09-24
CVE-2020-3552 (HIGH CVSS 7.4) | A vulnerability in the Ethernet pac | cvebase.io