// For flags

CVE-2018-0415

 

Severity Score

6.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper processing of certain EAPOL frames. An attacker could exploit this vulnerability by sending a stream of crafted EAPOL frames to an affected device. A successful exploit could allow the attacker to force the access point (AP) to disassociate all the associated stations (STAs) and to disallow future, new association requests. Cisco Bug IDs: CSCvj97472.

Una vulnerabilidad en la implementación de la funcionalidad Extensible Authentication Protocol over LAN (EAPOL) en Cisco Small Business 100 Series Wireless Access Points y Cisco Small Business 300 Series Wireless Access Points podría permitir que un atacante adyacente autenticado provoque una denegación de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a la gestión incorrecta de ciertos frames EAPOL. Un atacante podría explotar esta vulnerabilidad enviando un flujo de tramas EAPOL al dispositivo afectado. Su explotación con éxito podría permitir que el atacante fuerce al punto de acceso (AP) a desasociar todas las estaciones asociadas (STA) y a deshabilitar futuras peticiones nuevas de asociación. Cisco Bug IDs: CSCvj97472.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-11-27 CVE Reserved
  • 2018-08-15 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-17 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-388: 7PK - Errors
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Wap121 Firmware
Search vendor "Cisco" for product "Wap121 Firmware"
<= 1.0.6.6
Search vendor "Cisco" for product "Wap121 Firmware" and version " <= 1.0.6.6"
-
Affected
in Cisco
Search vendor "Cisco"
Wap121
Search vendor "Cisco" for product "Wap121"
--
Safe
Cisco
Search vendor "Cisco"
Wap125 Firmware
Search vendor "Cisco" for product "Wap125 Firmware"
<= 1.0.6.6
Search vendor "Cisco" for product "Wap125 Firmware" and version " <= 1.0.6.6"
-
Affected
in Cisco
Search vendor "Cisco"
Wap125
Search vendor "Cisco" for product "Wap125"
--
Safe
Cisco
Search vendor "Cisco"
Wap131 Firmware
Search vendor "Cisco" for product "Wap131 Firmware"
<= 1.0.6.6
Search vendor "Cisco" for product "Wap131 Firmware" and version " <= 1.0.6.6"
-
Affected
in Cisco
Search vendor "Cisco"
Wap131
Search vendor "Cisco" for product "Wap131"
--
Safe
Cisco
Search vendor "Cisco"
Wap150 Firmware
Search vendor "Cisco" for product "Wap150 Firmware"
<= 1.0.6.6
Search vendor "Cisco" for product "Wap150 Firmware" and version " <= 1.0.6.6"
-
Affected
in Cisco
Search vendor "Cisco"
Wap150
Search vendor "Cisco" for product "Wap150"
--
Safe
Cisco
Search vendor "Cisco"
Wap321 Firmware
Search vendor "Cisco" for product "Wap321 Firmware"
<= 1.0.6.6
Search vendor "Cisco" for product "Wap321 Firmware" and version " <= 1.0.6.6"
-
Affected
in Cisco
Search vendor "Cisco"
Wap321
Search vendor "Cisco" for product "Wap321"
--
Safe
Cisco
Search vendor "Cisco"
Wap351 Firmware
Search vendor "Cisco" for product "Wap351 Firmware"
<= 1.0.6.6
Search vendor "Cisco" for product "Wap351 Firmware" and version " <= 1.0.6.6"
-
Affected
in Cisco
Search vendor "Cisco"
Wap351
Search vendor "Cisco" for product "Wap351"
--
Safe
Cisco
Search vendor "Cisco"
Wap361 Firmware
Search vendor "Cisco" for product "Wap361 Firmware"
<= 1.0.6.6
Search vendor "Cisco" for product "Wap361 Firmware" and version " <= 1.0.6.6"
-
Affected
in Cisco
Search vendor "Cisco"
Wap361
Search vendor "Cisco" for product "Wap361"
--
Safe
Cisco
Search vendor "Cisco"
Wap371 Firmware
Search vendor "Cisco" for product "Wap371 Firmware"
<= 1.0.6.6
Search vendor "Cisco" for product "Wap371 Firmware" and version " <= 1.0.6.6"
-
Affected
in Cisco
Search vendor "Cisco"
Wap371
Search vendor "Cisco" for product "Wap371"
--
Safe