Vulnerabilities > Cisco > Aironet Ap340
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-11-15 | CVE-2014-7998 | Permissions, Privileges, and Access Controls vulnerability in Cisco IOS Cisco IOS on Aironet access points, when "dot11 aaa authenticator" debugging is enabled, allows remote attackers to cause a denial of service via a malformed EAP packet, aka Bug ID CSCul15509. | 7.1 |
2014-11-15 | CVE-2014-7997 | Resource Management Errors vulnerability in Cisco IOS The DHCP implementation in Cisco IOS on Aironet access points does not properly handle error conditions with short leases and unsuccessful lease-renewal attempts, which allows remote attackers to cause a denial of service (device restart) by triggering a transition into a recovery state that was intended to involve a network-interface restart but actually involves a full device restart, aka Bug ID CSCtn16281. | 6.1 |
2012-08-06 | CVE-2012-1350 | Unspecified vulnerability in Cisco products Cisco IOS 12.3 and 12.4 on Aironet access points allows remote attackers to cause a denial of service (radio-interface input-queue hang) via IAPP 0x3281 packets, aka Bug ID CSCtc12426. | 7.8 |
2002-07-03 | CVE-2002-0545 | Denial of Service vulnerability in Cisco Aironet Telnet Authentication Cisco Aironet before 11.21 with Telnet enabled allows remote attackers to cause a denial of service (reboot) via a series of login attempts with invalid usernames and passwords. | 5.0 |
2001-01-01 | CVE-2001-0163 | Unspecified vulnerability in Cisco Aironet Ap340 Cisco AP340 base station produces predictable TCP Initial Sequence Numbers (ISNs), which allows remote attackers to spoof or hijack TCP connections. | 4.6 |