// For flags

CVE-2020-3206

Cisco IOS XE Software Catalyst 9800 Series Wireless Controllers Denial of Service Vulnerability

Severity Score

4.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability in the handling of IEEE 802.11w Protected Management Frames (PMFs) of Cisco Catalyst 9800 Series Wireless Controllers that are running Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to terminate a valid user connection to an affected device. The vulnerability exists because the affected software does not properly validate 802.11w disassociation and deauthentication PMFs that it receives. An attacker could exploit this vulnerability by sending a spoofed 802.11w PMF from a valid, authenticated client on a network adjacent to an affected device. A successful exploit could allow the attacker to terminate a single valid user connection to the affected device.

Una vulnerabilidad en el manejo de IEEE 802.11w Protected Management Frames (PMFs) de Cisco Catalyst 9800 Series Wireless Controllers que son ejecutados en el Cisco IOS XE Software, podría permitir a un atacante adyacente no autenticado finalizar una conexión de usuario válida en un dispositivo afectado. La vulnerabilidad se presenta porque el software afectado no comprueba apropiadamente los PMF de disociación y desautenticación de 802.11w que los recibe. Un atacante podría explotar esta vulnerabilidad mediante el envío de un PMF 802.11w falsificado desde un cliente autenticado válido en una red adyacente hacia un dispositivo afectado. Una explotación con éxito podría permitir al atacante terminar una conexión de usuario válida única en el dispositivo afectado.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
Low
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2019-12-12 CVE Reserved
  • 2020-06-03 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-11-15 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
16.10.1
Search vendor "Cisco" for product "Ios Xe" and version "16.10.1"
-
Affected
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
16.10.1e
Search vendor "Cisco" for product "Ios Xe" and version "16.10.1e"
-
Affected
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
16.10.1s
Search vendor "Cisco" for product "Ios Xe" and version "16.10.1s"
-
Affected