ID

VAR-201608-0226


CVE

CVE-2016-6363


TITLE

plural Cisco Aironet Device software 802.11 Denial of service in rate limiting function of protocol implementation (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-004435

DESCRIPTION

The rate-limit feature in the 802.11 protocol implementation on Cisco Aironet 1800, 2800, and 3800 devices with software before 8.2.121.0 and 8.3.x before 8.3.102.0 allows remote attackers to cause a denial of service (device reload) via crafted 802.11 frames, aka Bug ID CSCva06192. Cisco Aironet AccessPoint is a small and medium-sized wireless network access point product. Cisco Aironet Access Points is prone to a denial-of-service vulnerability. Attackers can exploit this issue to reload the affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCva06192. Cisco Aironet 1800, 2800, and 3800 are all routers of Cisco (Cisco). Limit the speed of 802.11 traffic

Trust: 2.52

sources: NVD: CVE-2016-6363 // JVNDB: JVNDB-2016-004435 // CNVD: CNVD-2016-06436 // BID: 92511 // VULHUB: VHN-95183

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-06436

AFFECTED PRODUCTS

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.2\(100.0\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.1\(15.14\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.1\(112.3\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.2\(102.43\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.1\(131.0\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.1\(112.4\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.3.0

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:ltversion:8.3.x

Trust: 0.8

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.3.102.0

Trust: 0.8

vendor:ciscomodel:aironet series access pointscope:eqversion:3800

Trust: 0.6

vendor:ciscomodel:aironet series access pointscope:eqversion:2800

Trust: 0.6

vendor:ciscomodel:aironet series access pointscope:eqversion:1800

Trust: 0.6

vendor:ciscomodel:aironet series access pointsscope:eqversion:38000

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:eqversion:28000

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:eqversion:18000

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:38008.3.102.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:38008.2.121.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:28008.3.102.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:28008.2.121.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:18008.3.102.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:18008.2.121.0

Trust: 0.3

sources: CNVD: CNVD-2016-06436 // BID: 92511 // JVNDB: JVNDB-2016-004435 // CNNVD: CNNVD-201608-333 // NVD: CVE-2016-6363

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-6363
value: MEDIUM

Trust: 1.0

NVD: CVE-2016-6363
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2016-06436
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201608-333
value: MEDIUM

Trust: 0.6

VULHUB: VHN-95183
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2016-6363
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-06436
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-95183
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-6363
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-06436 // VULHUB: VHN-95183 // JVNDB: JVNDB-2016-004435 // CNNVD: CNNVD-201608-333 // NVD: CVE-2016-6363

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-95183 // JVNDB: JVNDB-2016-004435 // NVD: CVE-2016-6363

THREAT TYPE

specific network environment

Trust: 0.6

sources: CNNVD: CNNVD-201608-333

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201608-333

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004435

PATCH

title:cisco-sa-20160817-aap2url:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-aap2

Trust: 0.8

title:Patch for CiscoAironetAccessPoints Platform Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/80565

Trust: 0.6

title:Cisco Aironet 1800 , 2800 and 3800 Repair measures for platform denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63699

Trust: 0.6

sources: CNVD: CNVD-2016-06436 // JVNDB: JVNDB-2016-004435 // CNNVD: CNNVD-201608-333

EXTERNAL IDS

db:NVDid:CVE-2016-6363

Trust: 3.4

db:BIDid:92511

Trust: 2.6

db:SECTRACKid:1036645

Trust: 1.1

db:JVNDBid:JVNDB-2016-004435

Trust: 0.8

db:CNNVDid:CNNVD-201608-333

Trust: 0.7

db:CNVDid:CNVD-2016-06436

Trust: 0.6

db:NSFOCUSid:34592

Trust: 0.6

db:VULHUBid:VHN-95183

Trust: 0.1

sources: CNVD: CNVD-2016-06436 // VULHUB: VHN-95183 // BID: 92511 // JVNDB: JVNDB-2016-004435 // CNNVD: CNNVD-201608-333 // NVD: CVE-2016-6363

REFERENCES

url:http://www.securityfocus.com/bid/92511

Trust: 2.3

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160817-aap2

Trust: 2.0

url:http://www.securitytracker.com/id/1036645

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6363

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6363

Trust: 0.8

url:http://www.nsfocus.net/vulndb/34592

Trust: 0.6

url:http://www.cisco.com/cisco/web/solutions/small_business/products/wireless/aironet_series_access_points/index.html

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2016-06436 // VULHUB: VHN-95183 // BID: 92511 // JVNDB: JVNDB-2016-004435 // CNNVD: CNNVD-201608-333 // NVD: CVE-2016-6363

CREDITS

Cisco

Trust: 0.9

sources: BID: 92511 // CNNVD: CNNVD-201608-333

SOURCES

db:CNVDid:CNVD-2016-06436
db:VULHUBid:VHN-95183
db:BIDid:92511
db:JVNDBid:JVNDB-2016-004435
db:CNNVDid:CNNVD-201608-333
db:NVDid:CVE-2016-6363

LAST UPDATE DATE

2025-04-13T23:26:37.571000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-06436date:2016-08-19T00:00:00
db:VULHUBid:VHN-95183date:2016-12-12T00:00:00
db:BIDid:92511date:2016-08-17T00:00:00
db:JVNDBid:JVNDB-2016-004435date:2016-08-23T00:00:00
db:CNNVDid:CNNVD-201608-333date:2016-08-23T00:00:00
db:NVDid:CVE-2016-6363date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-06436date:2016-08-22T00:00:00
db:VULHUBid:VHN-95183date:2016-08-22T00:00:00
db:BIDid:92511date:2016-08-17T00:00:00
db:JVNDBid:JVNDB-2016-004435date:2016-08-23T00:00:00
db:CNNVDid:CNNVD-201608-333date:2016-08-18T00:00:00
db:NVDid:CVE-2016-6363date:2016-08-22T10:59:12.137