CVE-2021-1439

A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of incoming mDNS traffic. An attacker could exploit this vulnerability by sending a crafted mDNS packet to an affected device through a wireless network that is configured in FlexConnect local switching mode or through a wired network on a configured mDNS VLAN. A successful exploit could allow the attacker to cause the access point (AP) to reboot, resulting in a DoS condition.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:cisco:aironet_access_point_software:-:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1540:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:catalyst_9800_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*

History

22 May 2023, 18:57

Type Values Removed Values Added
First Time Cisco 1100 Integrated Services Router
CPE cpe:2.3:h:cisco:isr_1100:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*

31 Mar 2021, 16:57

Type Values Removed Values Added
CPE cpe:2.3:h:cisco:aironet_1540:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*
cpe:2.3:a:cisco:aironet_access_point_software:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:catalyst_9800_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:isr_1100:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 3.3
v3 : 7.4
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-mdns-dos-E6KwYuMx - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-mdns-dos-E6KwYuMx - Vendor Advisory

24 Mar 2021, 21:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-03-24 20:15

Updated : 2023-12-10 13:41


NVD link : CVE-2021-1439

Mitre link : CVE-2021-1439

CVE.ORG link : CVE-2021-1439


JSON object : View

Products Affected

cisco

  • aironet_access_point_software
  • aironet_1540
  • aironet_1800
  • aironet_1560
  • esw6300
  • aironet_2800
  • aironet_4800
  • catalyst_9800
  • catalyst_9800_firmware
  • aironet_3800
  • 1100_integrated_services_router
  • catalyst_9100
  • catalyst_iw6300
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')