
CVE-2016-6361
https://notcve.org/view.php?id=CVE-2016-6361
22 Aug 2016 — The Aggregated MAC Protocol Data Unit (AMPDU) implementation on Cisco Aironet 1800, 2800, and 3800 devices with software before 8.2.121.0 and 8.3.x before 8.3.102.0 allows remote attackers to cause a denial of service (device reload) via a crafted AMPDU header, aka Bug ID CSCuz56288. La implementación de Aggregated MAC Protocol Data Unit (AMPDU) en dispositivos Cisco Aironet 1800, 2800 y 3800 con software en versiones anteriores a 8.2.121.0 y 8.3.x en versiones anteriores 8.3.102.0 permite a atacantes remot... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-aap • CWE-20: Improper Input Validation •

CVE-2016-6362
https://notcve.org/view.php?id=CVE-2016-6362
22 Aug 2016 — Cisco Aironet 1800, 2800, and 3800 devices with software before 8.2.110.0, 8.2.12x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow local users to gain privileges via crafted CLI parameters, aka Bug ID CSCuz24725. Dispositivos Cisco Aironet 1800, 2800 y 3800 con software en versiones anteriores a 8.2.110.0, 8.2.12x en versiones anteriores a 8.2.121.0 y 8.3.x en versiones anteriores a 8.3.102.0 permiten a usuarios locales obtener privilegios a través de parámetros CLI manipulados, también conocido como Bug... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-aap1 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2016-6363
https://notcve.org/view.php?id=CVE-2016-6363
22 Aug 2016 — The rate-limit feature in the 802.11 protocol implementation on Cisco Aironet 1800, 2800, and 3800 devices with software before 8.2.121.0 and 8.3.x before 8.3.102.0 allows remote attackers to cause a denial of service (device reload) via crafted 802.11 frames, aka Bug ID CSCva06192. La función de la velocidad límite en el protocolo de implementación 802.11 en dispositivos Cisco Aironet 1800, 2800 y 3800 con software en versiones anteriores a 8.2.121.0 y 8.3.x en versiones anteriores a 8.3.102.0 permite a at... • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-aap2 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVE-2016-1419
https://notcve.org/view.php?id=CVE-2016-1419
10 Jun 2016 — Cisco Access Point devices with software 8.2(102.43) allow remote attackers to cause a denial of service (device reload) via crafted ARP packets, aka Bug ID CSCuy55803. Dispositivos Cisco Access Point con software 8.2(102.43) permite a atacantes remotos causar una denegación de servicio (reinicio del dispositivo) a través de paquetes ARP manipulados, también conocido como Bug ID CSCuy55803. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160608-aironet • CWE-20: Improper Input Validation •

CVE-2016-1418
https://notcve.org/view.php?id=CVE-2016-1418
08 Jun 2016 — Cisco Aironet Access Point Software 8.2(100.0) on 1830e, 1830i, 1850e, 1850i, 2800, and 3800 access points allows local users to obtain Linux root access via crafted CLI command parameters, aka Bug ID CSCuy64037. Cisco Aironet Access Point Software 8.2(100.0) en puntos de acceso 1830e, 1830i, 1850e, 1850i, 2800 y 3800 permite a usuarios locales obtener acceso root en Linux a través de parámetros de comando CLI manipulados, también conocido como Bug ID CSCuy64037. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160606-aap • CWE-20: Improper Input Validation •

CVE-2015-6320
https://notcve.org/view.php?id=CVE-2015-6320
15 Jan 2016 — The IP ingress packet handler on Cisco Aironet 1800 devices with software 8.1(112.3) and 8.1(112.4) allows remote attackers to cause a denial of service via a crafted header in an IP packet, aka Bug ID CSCuv63138. El manejador de paquetes IP de entrada en dispositivos Cisco Aironet 1800 con software 8.1(112.3) and 8.1(112.4) permite a atacantes remotos causar una denegación de servicio a través de una cabecera manipulada en un paquete IP, también conocido como Bug ID CSCuv63138. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-aironet • CWE-399: Resource Management Errors •

CVE-2015-6336
https://notcve.org/view.php?id=CVE-2015-6336
15 Jan 2016 — Cisco Aironet 1800 devices with software 7.2, 7.3, 7.4, 8.1(112.3), 8.1(112.4), and 8.1(15.14) have a default account, which makes it easier for remote attackers to obtain access via unspecified vectors, aka Bug ID CSCuw58062. Dispositivos Cisco Aironet 1800 con software 7.2, 7.3, 7.4, 8.1(112.3), 8.1(112.4) y 8.1(15.14) tienen una cuenta por defecto, lo que hace que sea más fácil para atacantes remotos obtener acceso a través de vectores no especificados, también conocido como Bug ID CSCuw58062. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160113-air • CWE-255: Credentials Management Errors •

CVE-2015-6367
https://notcve.org/view.php?id=CVE-2015-6367
14 Nov 2015 — Cisco Aironet 1800 devices with software 8.1(131.0) allow remote attackers to cause a denial of service (CPU consumption) by improperly establishing many SSHv2 connections, aka Bug ID CSCux13374. Dispositivos Cisco Aironet 1800 con software 8.1(131.0) permite a atacantes remotos provocar una denegación de servicio (consumo de CPU) mediante el establecimiento indebido de muchas conexiones SSHv2, también conocido como Bug ID CSCux13374. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151113-aironet • CWE-399: Resource Management Errors •

CVE-2015-6315
https://notcve.org/view.php?id=CVE-2015-6315
13 Oct 2015 — Cisco Aironet 1850 access points with software 8.1(112.4) allow local users to gain privileges via crafted CLI commands, aka Bug ID CSCuv79694. Puntos de acceso Cisco Aironet 1850 con software 8.1(112.4) permiten a usuarios locales ganar privilegios a través de comandos CLI manipulados, también conocido como Bug ID CSCuv79694. • http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151005-aironet • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2014-7997
https://notcve.org/view.php?id=CVE-2014-7997
15 Nov 2014 — The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281. La implementación DHCP en Cisco IOS en puntos de acceso Aironet no maneja debidamente las condicion... • http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-7997 • CWE-399: Resource Management Errors •