CVE-2020-3262 (CNNVD-202004-1106)
中文标题:
Cisco Wireless LAN Controller Software 输入验证错误漏洞
英文标题:
Cisco Wireless LAN Controller CAPWAP Denial of Service Vulnerability
漏洞描述
中文描述:
Cisco Wireless LAN Controller(WLC)Software是美国思科(Cisco)公司的一套用于配置和管理WLC(无线局域网控制器)的软件。 Cisco WLC Software中的Control and Provisioning of Wireless Access Points(CAPWAP)协议处理器存在输入验证错误漏洞,该漏洞源于程序没有充分验证CAPWAP数据包。攻击者可利用该漏洞造成拒绝服务。
英文描述:
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol handler of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to restart, resulting in a DoS condition.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Aironet Access Point Software | n/a | - | - |
cpe:2.3:a:cisco:cisco_aironet_access_point_software:n_a:*:*:*:*:*:*:*
|
| cisco | 5508_wireless_controller_firmware | 8.8\(120.0\) | - | - |
cpe:2.3:o:cisco:5508_wireless_controller_firmware:8.8\(120.0\):*:*:*:*:*:*:*
|
| cisco | 5520_wireless_controller_firmware | 8.8\(120.0\) | - | - |
cpe:2.3:o:cisco:5520_wireless_controller_firmware:8.8\(120.0\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.0 (cna)
HIGHCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-3262 |
2025-11-11 15:20:37 | 2025-11-11 07:36:18 |
| NVD | nvd_CVE-2020-3262 |
2025-11-11 14:56:57 | 2025-11-11 07:44:43 |
| CNNVD | cnnvd_CNNVD-202004-1106 |
2025-11-11 15:10:24 | 2025-11-11 07:55:47 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 输入验证错误
- cnnvd_id: 未提取 -> CNNVD-202004-1106
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 3
- data_sources: ['cve'] -> ['cve', 'nvd']