A vulnerability in Ethernet over GRE (EoGRE) packet processing of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9800 Family Wireless Controller, Embedded Wireless Controller, and Embedded Wireless on Catalyst 9000 Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper processing of malformed EoGRE packets. An attacker could exploit this vulnerability by sending malicious packets to the affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-gre-6u4ELzAT | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
08 Jul 2022, 18:23
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
07 Oct 2021, 19:39
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-400 | |
CPE | cpe:2.3:h:cisco:catalyst_9800-l-c:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9800-l-f:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 8.6 |
References | (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-gre-6u4ELzATĀ - Patch, Vendor Advisory |
23 Sep 2021, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-23 03:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-1611
Mitre link : CVE-2021-1611
CVE.ORG link : CVE-2021-1611
JSON object : View
Products Affected
cisco
- catalyst_9800-40
- ios_xe
- catalyst_9800-80
- catalyst_9800-cl
- catalyst_9800-l-c
- catalyst_9800-l
- catalyst_9800
- catalyst_9800-l-f
CWE