CVE-2021-1439

HIGH

Cisco Aironet Access Point Software < 17.3.3 - Buffer Overflow

Title source: rule
STIX 2.1

Description

A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of incoming mDNS traffic. An attacker could exploit this vulnerability by sending a crafted mDNS packet to an affected device through a wireless network that is configured in FlexConnect local switching mode or through a wired network on a configured mDNS VLAN. A successful exploit could allow the attacker to cause the access point (AP) to reboot, resulting in a DoS condition.

References (1)

Core 1

Scores

CVSS v3 7.4
EPSS 0.0011
EPSS Percentile 28.3%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-120
Status published
Products (2)
cisco/aironet_access_point_software
cisco/catalyst_9800_firmware 17.1 - 17.3.3
Published Mar 24, 2021
Tracked Since Feb 18, 2026