MEDIUM · 6.1

CVE-2012-6026

The HTTP Profiler on the Cisco Aironet Access Point with software 15.2 and earlier does not properly manage buffers, which allows remote attackers to cause a denial of service (device reload) via craf...

Vulnerability Description

The HTTP Profiler on the Cisco Aironet Access Point with software 15.2 and earlier does not properly manage buffers, which allows remote attackers to cause a denial of service (device reload) via crafted HTTP requests, aka Bug ID CSCuc62460.

CVSS Score

6.1

MEDIUM

AV:A/AC:L/Au:N/C:N/I:N/A:C
Confidentiality
NONE
Integrity
NONE
Availability
COMPLETE

Affected Products

VendorProductVersions
CiscoAironet Access Point Software7.3
CiscoAironet Access Point-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2012-6026?

CVE-2012-6026 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The HTTP Profiler on the Cisco Aironet Access Point with software 15.2 and earlier does not properly manage buffers, which allows remote attackers to cause a denial of service (device reload) via craf...

How severe is CVE-2012-6026?

CVE-2012-6026 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2012-6026?

Check the references section above for vendor advisories and patch information. Affected products include: Cisco Aironet Access Point Software, Cisco Aironet Access Point.