A vulnerability in the 802.11r Fast Transition (FT) implementation for Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected interface. The vulnerability is due to a lack of complete error handling condition for client authentication requests sent to a targeted interface configured for FT. An attacker could exploit this vulnerability by sending crafted authentication request traffic to the targeted interface, causing the device to restart unexpectedly.
Metrics
Affected Vendors & Products
References
History
Fri, 22 Nov 2024 08:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2019-07-17T20:20:13.229582Z
Updated: 2024-11-21T19:19:08.762Z
Reserved: 2018-12-06T00:00:00
Link: CVE-2019-1920
Vulnrichment
Updated: 2024-08-04T18:35:51.296Z
NVD
Status : Modified
Published: 2019-07-17T21:15:12.093
Modified: 2024-11-21T04:37:41.320
Link: CVE-2019-1920
Redhat
No data.