Cisco Mobility Express 2800/Mobility Express 3800 8.2(121.12)/8.4(1.82) 802.11 Ingress Connection Authentication resource management
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.1 | $0-$5k | 0.04 |
A vulnerability, which was classified as problematic, has been found in Cisco Mobility Express 2800 and Mobility Express 3800 8.2(121.12)/8.4(1.82). This issue affects an unknown part of the component 802.11 Ingress Connection Authentication Handler. The manipulation with an unknown input leads to a resource management vulnerability. Using CWE to declare the problem leads to CWE-399. Impacted is availability. The summary by CVE is:
A Denial of Service Vulnerability in 802.11 ingress connection authentication handling for the Cisco Mobility Express 2800 and 3800 Access Points (APs) could allow an unauthenticated, adjacent attacker to cause authentication to fail. Affected Products: This vulnerability affects Cisco Mobility Express 2800 Series and 3800 Series Access Points when configured in local mode in 40 MHz. More Information: CSCvb33575. Known Affected Releases: 8.2(121.12) 8.4(1.82). Known Fixed Releases: 8.2(131.2) 8.2(131.3) 8.2(131.4) 8.2(141.0) 8.3(104.53) 8.3(104.54) 8.4(1.80) 8.4(1.85).
The bug was discovered 01/18/2017. The weakness was disclosed 01/26/2017 with Cisco as CSCvb33575 as confirmed advisory (Website). It is possible to read the advisory at securityfocus.com. The identification of this vulnerability is CVE-2016-9221 since 11/06/2016. The attack needs to be done within the local network. No form of authentication is needed for a successful exploitation. The technical details are unknown and an exploit is not publicly available.
The vulnerability was handled as a non-public zero-day exploit for at least 8 days. During that time the estimated underground price was around $0-$5k.
Upgrading to version 8.2(131.2), 8.2(131.3), 8.2(131.4), 8.2(141.0), 8.3(104.53), 8.3(104.54), 8.4(1.80) or 8.4(1.85) eliminates this vulnerability.
The entry 95986 is pretty similar.
Product
Vendor
Name
Version
License
Support
- end of life (old version)
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.3VulDB Meta Temp Score: 4.2
VulDB Base Score: 4.3
VulDB Temp Score: 4.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 4.3
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource managementCWE: CWE-399 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
OpenVAS ID: 800316
OpenVAS Name: Cisco Mobility Express 2800 and 3800 802.11 Denial of Service Vulnerability
OpenVAS File: 🔍
OpenVAS Family: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Mobility Express 2800/Mobility Express 3800 8.2(131.2)/8.2(131.3)/8.2(131.4)/8.2(141.0)/8.3(104.53)/8.3(104.54)/8.4(1.80)/8.4(1.85)
Timeline
11/06/2016 🔍01/18/2017 🔍
01/18/2017 🔍
01/26/2017 🔍
01/26/2017 🔍
01/26/2017 🔍
08/02/2020 🔍
Sources
Vendor: cisco.comAdvisory: CSCvb33575⛔
Organization: Cisco
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2016-9221 (🔍)
SecurityFocus: 95631 - Cisco Mobility Express 2800 and 3800 Access Points CVE-2016-9221 Denial of Service Vulnerability
OSVDB: - CVE-2016-9221 - Cisco - Multiple Products - Denial of Service Issue
See also: 🔍
Entry
Created: 01/26/2017 14:57Updated: 08/02/2020 08:57
Changes: 01/26/2017 14:57 (66), 08/02/2020 08:57 (7)
Complete: 🔍
Cache ID: 3:05B:103
No comments yet. Languages: en.
Please log in to comment.