The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Aruba, Cisco Aironet, Meraki: memory corruption via Texas Instruments Bluetooth Low Energy

Synthesis of the vulnerability 

An attacker can generate a memory corruption via Texas Instruments Bluetooth Low Energy of products of several editors, in order to trigger a denial of service, and possibly to run code.
Impacted software: ArubaOS, Cisco Aironet, Meraki MR***.
Severity of this computer vulnerability: 3/4.
Creation date: 05/11/2018.
Références of this announce: ARUBA-PSA-2018-006, BleedingBit, CERTFR-2018-AVI-528, cisco-sa-20181101-ap, CSCvk44163, CVE-2018-16986, VIGILANCE-VUL-27688, VU#317277.

Description of the vulnerability 

An attacker can generate a memory corruption via Texas Instruments Bluetooth Low Energy of products of several editors, in order to trigger a denial of service, and possibly to run code.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity note impacts software or systems such as ArubaOS, Cisco Aironet, Meraki MR***.

Our Vigil@nce team determined that the severity of this computer weakness announce is important.

The trust level is of type confirmed by the editor, with an origin of radio connection.

An attacker with a expert ability can exploit this cybersecurity vulnerability.

Solutions for this threat 

ArubaOS: fixed versions for Texas Instruments Bluetooth Low Energy.
Fixed versions are indicated in information sources.

Cisco Aironet, Meraki: solution CSCvk44163.
The solution is described on the Cisco site:
  https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvk44163
  https://tools.cisco.com/bugsearch/bug/CSCvk44163
  https://tools.cisco.com/quickview/bug/CSCvk44163
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides cybersecurity patches. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system.