Vulnslist

find the latest Cisco vulnerabilities

Cisco Access Point Software Uncontrolled Resource Consumption Vulnerability

cisco-sa-ap-dos-capwap-DDMCZS4m · Medium · Published · Updated

A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to exhaust resources on an affected device.  This vulnerability is due to insufficient management of resources when handling certain types of traffic. An attacker could exploit this vulnerability by sending a series of specific wireless packets to an affected device. A successful exploit could allow the attacker to consume resources on an affected device. A sustained attack could lead to the disruption of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel and intermittent loss of wireless client traffic. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-capwap-DDMCZS4m

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2023-20268
Cisco Bug IDsCSCwe75371, CSCwi18537
CVSS ScoreBase 4.7
Base 4.7 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L/E:X/RL:X/RC:X
Product Names From Source
Cisco Aironet Access Point Software, Cisco Business Wireless Access Point Software, Cisco Aironet Access Point Software (IOS XE Controller)

Related Products

Product CVE Evidence
Cisco Nexus Dashboard CVE-2023-20268 Cisco OpenVuln
Cisco IOS XE Software CVE-2023-20268 Cisco OpenVuln
Cisco IOS Software CVE-2023-20268 Cisco OpenVuln
Cisco Business Wireless Access Point Software CVE-2023-20268 Cisco OpenVuln
Cisco Aironet Access Point Software (IOS XE Controller) CVE-2023-20268 Cisco OpenVuln
Cisco Aironet Access Point Software CVE-2023-20268 Cisco OpenVuln