Cisco Cisco Aironet 1200 Access Point 릴리즈 노트
22
Release Notes for Cisco Aironet Access Points for Cisco IOS Release 12.3(8)JEC1
OL-16115-01
Caveats
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(8)JEC1:
•
CSCsj56438—Crafted EAP response identity packet may cause device to reload.
This Cisco Bug ID identifies a vulnerability in Cisco's implementation of Extensible Authentication
Protocol (EAP) that exists when processing a crafted EAP Response Identity packet. This
vulnerability affects several Cisco products that have support for wired or wireless EAP
implementations.
Protocol (EAP) that exists when processing a crafted EAP Response Identity packet. This
vulnerability affects several Cisco products that have support for wired or wireless EAP
implementations.
This vulnerabilityis documented in the following Cisco bug IDs:
Wireless EAP - CSCsj56438
Wired EAP - CSCsb45696 and CSCsc55249
This Cisco Security Response is available at
•
CSCsg39295—Syslog Displays Password if SCP or FTP Selected in CISCO-COPY-CONFIG-MIB
•
CSCsm54952—Access point GUI support needed for adding and displaying local user with “secret.”
•
CSCsj85065—A Cisco IOS device may crash while processing an SSL packet. This can happen
during the termination of an SSL-based session. The offending packet is not malformed and is
normally received as part of the packet exchange.
during the termination of an SSL-based session. The offending packet is not malformed and is
normally received as part of the packet exchange.
Cisco has released free software updates that address this vulnerability.
Aside from disabling affected services, there are no available workarounds to mitigate an exploit of
this vulnerability.
this vulnerability.
This advisory is posted at
•
CSCsj97493—Access point GUI home page is not loading properly and displays JavaScript errors.
•
CSCsb85791—1130 access point crashes just after installation of ew image.
•
CSCsk63882—Bad ID error with traceback seen when 12.4-Based 802.11 access point starts up.
•
CSCsm15944—Non root bridge shows env: WARNING: No reading temperature monitoring is at
INITIALIZE state.
INITIALIZE state.
•
CSCsl49277—1310 outdoor access point/bridge crashes when attempting to associate using
authentication shared.
authentication shared.
•
CSCsj68025—Roaming between 1242 access point bridged on radio 1 fails due to WPA-PSK
authentication failure.
authentication failure.
•
CSCsl95464—Access point crashes on WLCCP WDS process.
•
CSCsk28551—Root bridge does not update bridge table.
•
CSCsl84045—Traceback and bad refcount in datagram_done errors seen on 1230 and 1240 series
access points.
access points.
•
CSCsk44106—SNMP returns incorrect cipher values for some clients in
cDot11ClientUnicastCipher when multiple ciphers are defined on an interface.
cDot11ClientUnicastCipher when multiple ciphers are defined on an interface.
•
CSCsl95939—An access point may log a misleading message when a client attempts to associate.
•
CSCsk52584—Misleading no SSID warning reported on access point when no VLAN is configured.
•
CSCsl72417—Workgroup bridge association problem with WPA-TKIP-CCKM security type.
•
CSCsk85945—Workgroup bridge running WPA1 cannot associate to a WPA1+WPA2 WLAN.