-
It is possible to cause a denial-of-service attack if Cisco Aironet products have Telnet access enabled. Telnet access is the only requirement for such an attack; there are no additional conditions.
The workaround for this vulnerability is to disable Telnet access.
No other Cisco product is vulnerable.
This advisory is available at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20020409-aironet-telnet.
-
This section provides details on affected products.
Vulnerable Products
All releases up to, but excluding, 11.21 are vulnerable. The following hardware products are affected.
-
Cisco Aironet Access Point 340 and 350
-
Cisco Aironet Bridge 350
Products Confirmed Not Vulnerable
Products not affected are:
-
Cisco Aironet Bridge 340
-
Cisco Aironet 4800 Series
-
Cisco Aironet 4500 Series and 3500 Series
-
Cisco Aironet 3100 Series
No other Cisco products are currently known to be affected by these vulnerabilities.
-
Cisco Aironet Access Point 340 and 350
-
This vulnerability is documented as Cisco Bug ID CSCdw81244.
It is possible to cause Cisco Aironet products to reboot if Telnet access is enabled and a password is required for authorization. This can be accomplished by providing an invalid username and password. This vulnerability cannot be triggered via the web interface.
-
The workaround is to disable Telnet access. You can accomplish this by following the link, via the web interface, path to reach the Console/Telnet Setup page:
-
On the Summary Status page, click Setup.
-
On the Setup page, click Console/Telnet in the
Services section of the page.
-
On that page, click on the radio button for Disable
Telnet.
Note: You must use the web interface or be connected on the console since you will be unable to save your changes if you are using Telnet. After disabling Telnet, your Telnet session will be terminated.
-
On the Summary Status page, click Setup.
-
This vulnerability is fixed in release 11.21, which is available now.
-
This issue was reported to Cisco by a customer. Cisco PSIRT is not aware of any malicious exploitation or public discussion of this vulnerability.
-
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
-
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.