Vulnerability Description
The HTTP Profiler on the Cisco Aironet Access Point with software 15.2 and earlier does not properly manage buffers, which allows remote attackers to cause a denial of service (device reload) via crafted HTTP requests, aka Bug ID CSCuc62460.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Aironet Access Point Software | 7.3 |
| Cisco | Aironet Access Point | - |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6026Vendor Advisory
- http://tools.cisco.com/security/center/viewAlert.x?alertId=28436Vendor Advisory
- http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2012-6026Vendor Advisory
- http://tools.cisco.com/security/center/viewAlert.x?alertId=28436Vendor Advisory
FAQ
What is CVE-2012-6026?
CVE-2012-6026 is a vulnerability with a CVSS score of 6.1 (MEDIUM). The HTTP Profiler on the Cisco Aironet Access Point with software 15.2 and earlier does not properly manage buffers, which allows remote attackers to cause a denial of service (device reload) via craf...
How severe is CVE-2012-6026?
CVE-2012-6026 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-6026?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Aironet Access Point Software, Cisco Aironet Access Point.