{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T21:47:38.186","vulnerabilities":[{"cve":{"id":"CVE-2018-0441","sourceIdentifier":"psirt@cisco.com","published":"2018-10-17T22:29:00.550","lastModified":"2024-11-21T03:38:14.210","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the 802.11r Fast Transition feature set of Cisco IOS Access Points (APs) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a corruption of certain timer mechanisms triggered by specific roaming events. This corruption will eventually cause a timer crash. An attacker could exploit this vulnerability by sending malicious reassociation events multiple times to the same AP in a short period of time, causing a DoS condition on the affected AP."},{"lang":"es","value":"Una vulnerabilidad en el conjunto de características 802.11r Fast Transition en Cisco IOS Access Points (APs) Software podría permitir que un atacante adyacente sin autenticar provoque una denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se debe a la corrupción de ciertos mecanismos de temporización desencadenados por eventos concretos de roaming. Esta corrupción acabará provocando un cierre inesperado del temporizador. Un atacante podría explotar esta vulnerabilidad enviando eventos maliciosos de reasociación múltiples veces al mismo AP en un corto espacio de tiempo, lo que provoca una condición de denegación de servicio (DoS) en el AP afectado."}],"metrics":{"cvssMetricV30":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:N/I:N/A:C","baseScore":6.1,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":6.5,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:access_points:8.0\\(140.0\\):*:*:*:*:*:*:*","matchCriteriaId":"2A2819B0-F330-4842-A71E-B0BADF999FEF"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:access_points:8.2\\(141.0\\):*:*:*:*:*:*:*","matchCriteriaId":"6E8217BA-0CEC-4E93-853E-EE86C2118954"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:access_points:8.2\\(151.0\\):*:*:*:*:*:*:*","matchCriteriaId":"F92DE6E7-FFCA-4206-8C40-124A243778A9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:access_points:8.3\\(102.0\\):*:*:*:*:*:*:*","matchCriteriaId":"67AA1EAD-5FD9-44F0-836E-16D93E7D8D02"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:access_points:8.3\\(112.0\\):*:*:*:*:*:*:*","matchCriteriaId":"32A6643B-AAB1-4D92-82CE-1F369FDFB796"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:access_points:8.3\\(114.74\\):*:*:*:*:*:*:*","matchCriteriaId":"0D16FE04-C08A-44B8-9EB3-D6C1E2E117DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:access_points:15.3\\(3\\)jd:*:*:*:*:*:*:*","matchCriteriaId":"2AF5D480-A6E6-4933-BDA8-782C71D8EA67"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:access_points:*:*:*:*:*:*:*:*","versionEndExcluding":"8.3.140.0","matchCriteriaId":"27B3BAA1-C708-40E2-8C2F-42EA78825B8D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:access_points:*:*:*:*:*:*:*:*","versionStartIncluding":"8.4","versionEndExcluding":"8.5.110.0","matchCriteriaId":"19F09BB9-D027-40C7-8D49-3AEC96C530EA"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/105680","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041918","source":"psirt@cisco.com","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-ap-ft-dos","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/105680","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securitytracker.com/id/1041918","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-ap-ft-dos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}