Cisco Cisco Aironet 1200 Access Point 릴리즈 노트
18
Release Notes for Cisco Aironet Access Points for Cisco IOS Release 12.3(8)JEC
OL-14518-01
Troubleshooting
•
CSCsk44106—SNMP returns incorrect cipher values for some clients when multiple ciphers are
defined on an interface. This condition only affects some of the clients when there are multiple
ciphers on the interface.
defined on an interface. This condition only affects some of the clients when there are multiple
ciphers on the interface.
Workaround: None.
Resolved Caveats
These caveats are resolved in Cisco IOS Release 12.3(8)JEC:
•
CSCse56501
A device running Cisco IOS software that has Internet Protocol version 6 (IPv6) enabled may be
subject to a denial of service (DoS) attack. For the device to be affected by this vulnerability the
device also has to have certain Internet Protocol version 4 (IPv4) User Datagram Protocol (UDP)
services enabled. To exploit this vulnerability an offending IPv6 packet must be targeted to the
device. Packets that are routed throughout the router can not trigger this vulnerability. Successful
exploitation will prevent the interface from receiving any additional traffic. The only exception is
Resource Reservation Protocol (RSVP) service, which if exploited, will cause the device to crash.
Only the interface on which the vulnerability was exploited will be affected.
subject to a denial of service (DoS) attack. For the device to be affected by this vulnerability the
device also has to have certain Internet Protocol version 4 (IPv4) User Datagram Protocol (UDP)
services enabled. To exploit this vulnerability an offending IPv6 packet must be targeted to the
device. Packets that are routed throughout the router can not trigger this vulnerability. Successful
exploitation will prevent the interface from receiving any additional traffic. The only exception is
Resource Reservation Protocol (RSVP) service, which if exploited, will cause the device to crash.
Only the interface on which the vulnerability was exploited will be affected.
Cisco is providing fixed software to address this issue. There are workarounds available to mitigate
the effects of the vulnerability.
the effects of the vulnerability.
This advisory is posted at
•
CSCsj22047—Unable to modify or disable Key Management for configured SSID.
•
CSCsj17603—dot11ARP cache does not use client MAC address when sending ARP response
•
CSCsj13920—When saving config just within 32768 bytes, 1231G-J-K09 running Cisco IOS
release 12.3(7)JA halts.
release 12.3(7)JA halts.
If You Need More Information
If you need information about a specific caveat that does not appear in these release notes, you can use
the Cisco Bug Toolkit to find select caveats of any severity. Click this URL to browse to the Bug Toolkit:
the Cisco Bug Toolkit to find select caveats of any severity. Click this URL to browse to the Bug Toolkit:
(If you request a defect that cannot be displayed, the defect number might not exist, the defect might not
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)
yet have a customer-visible description, or the defect might be marked Cisco Confidential.)
Troubleshooting
For the most up-to-date, detailed troubleshooting information, refer to the Cisco TAC website at
. Click Technology Support, choose Wireless
from the menu on the left, and click Wireless LAN.