{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T12:29:07.764","vulnerabilities":[{"cve":{"id":"CVE-2021-1439","sourceIdentifier":"psirt@cisco.com","published":"2021-03-24T20:15:14.977","lastModified":"2024-11-21T05:44:22.010","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the multicast DNS (mDNS) gateway feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of incoming mDNS traffic. An attacker could exploit this vulnerability by sending a crafted mDNS packet to an affected device through a wireless network that is configured in FlexConnect local switching mode or through a wired network on a configured mDNS VLAN. A successful exploit could allow the attacker to cause the access point (AP) to reboot, resulting in a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en la funcionalidad multicast DNS (mDNS) gateway del Software Cisco Aironet Series Access Points, podría permitir a un atacante adyacente no autenticado causar una condición de denegación de servicio (DoS) en un dispositivo afectado.&#xa0;Esta vulnerabilidad es debido a una comprobación insuficiente de la entrada del tráfico mDNS entrante.&#xa0;Un atacante podría explotar esta vulnerabilidad mediante el envío de un paquete mDNS diseñado hacia un dispositivo afectado por medio de una red inalámbrica configurada en el modo de conmutación local FlexConnect o mediante una red cableada en una VLAN mDNS configurada.&#xa0;Una explotación con éxito podría permitir al atacante causar que el punto de acceso (AP) se reinicie, lo que resultaría en una condición de DoS"}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:A/AC:L/Au:N/C:N/I:N/A:P","baseScore":3.3,"accessVector":"ADJACENT_NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":6.5,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:aironet_access_point_software:-:*:*:*:*:*:*:*","matchCriteriaId":"D48036EE-DE42-412A-B3C9-CBCE7414DB33"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*","matchCriteriaId":"1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1540:-:*:*:*:*:*:*:*","matchCriteriaId":"72BFEED4-7AD7-406F-A044-BDEA98133711"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:*","matchCriteriaId":"8191FD87-4E55-4F38-8DB0-7E6772AD075B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:*","matchCriteriaId":"02F4C00A-D1E2-4B21-A14E-F30B4B818493"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*","matchCriteriaId":"3C28A6B0-10FF-4C6D-8527-2313E163C98E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*","matchCriteriaId":"7636F7E2-E386-4F8C-A0C5-F510D8E21DA4"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:*","matchCriteriaId":"C4D8A4CB-5B80-4332-BCBC-DA18AD94D215"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:*","matchCriteriaId":"749040C6-A21A-4EF3-8213-42EE01CFA303"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*","matchCriteriaId":"C559D6F7-B432-4A2A-BE0E-9697CC412C70"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*","matchCriteriaId":"09051BC5-CFE7-43EF-975D-BF77724E8776"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:catalyst_9800_firmware:*:*:*:*:*:*:*:*","versionStartIncluding":"17.1","versionEndExcluding":"17.3.3","matchCriteriaId":"8BDFBA81-4DF6-4BC8-8D16-2520510ADE2E"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800:-:*:*:*:*:*:*:*","matchCriteriaId":"A48E6CF0-7A3B-4D11-8D02-0CD38F2420E9"}]}]}],"references":[{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-mdns-dos-E6KwYuMx","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-mdns-dos-E6KwYuMx","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}