Vulnerabilities > Cisco > Aironet Ap1300
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-11-15 | CVE-2014-7998 | Permissions, Privileges, and Access Controls vulnerability in Cisco IOS Cisco IOS on Aironet access points, when "dot11 aaa authenticator" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509. | 7.1 |
2014-11-15 | CVE-2014-7997 | Resource Management Errors vulnerability in Cisco IOS The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281. | 6.1 |
2012-08-06 | CVE-2012-1350 | Unspecified vulnerability in Cisco products Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426. | 7.8 |
2006-01-22 | CVE-2006-0354 | Resource Management Errors vulnerability in Cisco products Cisco IOS before 12.3-7-JA2 on Aironet Wireless Access Points (WAP) allows remote authenticated users to cause a denial of service (termination of packet passing or termination of client connections) by sending the management interface a large number of spoofed ARP packets, which creates a large ARP table that exhausts memory, aka Bug ID CSCsc16644. | 5.5 |