Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2021-1373

A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of Cisco IOS XE Wireless Controller Software for the Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition of an affected device. The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.002
EPSS Ranking 41.8%
CVSS Severity
CVSS v3 Score 8.6
CVSS v2 Score 7.8
Products affected by CVE-2021-1373
  • Cisco » Catalyst 9300 » Version: N/A
    cpe:2.3:h:cisco:catalyst_9300:-
  • Cisco » Catalyst 9400 » Version: N/A
    cpe:2.3:h:cisco:catalyst_9400:-
  • Cisco » Catalyst 9500 » Version: N/A
    cpe:2.3:h:cisco:catalyst_9500:-
  • Cisco » Catalyst 9800-40 » Version: N/A
    cpe:2.3:h:cisco:catalyst_9800-40:-
  • Cisco » Catalyst 9800-80 » Version: N/A
    cpe:2.3:h:cisco:catalyst_9800-80:-
  • Cisco » Catalyst 9800-Cl » Version: N/A
    cpe:2.3:h:cisco:catalyst_9800-cl:-
  • Cisco » Catalyst 9800-L » Version: N/A
    cpe:2.3:h:cisco:catalyst_9800-l:-
  • Cisco » Ios Xe » Version: 16.10.1
    cpe:2.3:o:cisco:ios_xe:16.10.1
  • Cisco » Ios Xe » Version: 16.10.1e
    cpe:2.3:o:cisco:ios_xe:16.10.1e
  • Cisco » Ios Xe » Version: 16.10.1s
    cpe:2.3:o:cisco:ios_xe:16.10.1s
  • Cisco » Ios Xe » Version: 16.11.1
    cpe:2.3:o:cisco:ios_xe:16.11.1
  • Cisco » Ios Xe » Version: 16.11.1a
    cpe:2.3:o:cisco:ios_xe:16.11.1a
  • Cisco » Ios Xe » Version: 16.11.1b
    cpe:2.3:o:cisco:ios_xe:16.11.1b
  • Cisco » Ios Xe » Version: 16.11.1c
    cpe:2.3:o:cisco:ios_xe:16.11.1c
  • Cisco » Ios Xe » Version: 16.11.2
    cpe:2.3:o:cisco:ios_xe:16.11.2
  • Cisco » Ios Xe » Version: 16.12.1
    cpe:2.3:o:cisco:ios_xe:16.12.1
  • Cisco » Ios Xe » Version: 16.12.1s
    cpe:2.3:o:cisco:ios_xe:16.12.1s
  • Cisco » Ios Xe » Version: 16.12.1t
    cpe:2.3:o:cisco:ios_xe:16.12.1t
  • Cisco » Ios Xe » Version: 16.12.2s
    cpe:2.3:o:cisco:ios_xe:16.12.2s
  • Cisco » Ios Xe » Version: 16.12.2t
    cpe:2.3:o:cisco:ios_xe:16.12.2t
  • Cisco » Ios Xe » Version: 16.12.3
    cpe:2.3:o:cisco:ios_xe:16.12.3
  • Cisco » Ios Xe » Version: 16.12.3s
    cpe:2.3:o:cisco:ios_xe:16.12.3s
  • Cisco » Ios Xe » Version: 16.12.4
    cpe:2.3:o:cisco:ios_xe:16.12.4
  • Cisco » Ios Xe » Version: 16.12.4a
    cpe:2.3:o:cisco:ios_xe:16.12.4a
  • Cisco » Ios Xe » Version: 17.1.1
    cpe:2.3:o:cisco:ios_xe:17.1.1
  • Cisco » Ios Xe » Version: 17.1.1s
    cpe:2.3:o:cisco:ios_xe:17.1.1s
  • Cisco » Ios Xe » Version: 17.1.1t
    cpe:2.3:o:cisco:ios_xe:17.1.1t
  • Cisco » Ios Xe » Version: 17.1.2
    cpe:2.3:o:cisco:ios_xe:17.1.2
  • Cisco » Ios Xe » Version: 17.2.1
    cpe:2.3:o:cisco:ios_xe:17.2.1
  • Cisco » Ios Xe » Version: 17.2.1a
    cpe:2.3:o:cisco:ios_xe:17.2.1a
  • Cisco » Ios Xe » Version: 17.2.3
    cpe:2.3:o:cisco:ios_xe:17.2.3
  • Cisco » Ios Xe » Version: 17.3.1
    cpe:2.3:o:cisco:ios_xe:17.3.1


Contact Us

Shodan ® - All rights reserved