Vulnslist

find the latest Cisco vulnerabilities

Cisco Embedded Wireless Controller with Catalyst Access Points IP Flood Denial of Service Vulnerability

cisco-sa-ap-ip-flood-dos-6hxxENVQ · High · Published · Updated

A vulnerability in IP ingress packet processing of the Cisco Embedded Wireless Controller with Catalyst Access Points Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, causing a denial of service (DoS) condition. The device may experience a performance degradation in traffic processing or high CPU usage prior to the unexpected reload. This vulnerability is due to improper rate limiting of IP packets to the management interface. An attacker could exploit this vulnerability by sending a steady stream of IP traffic at a high rate to the management interface of the affected device. A successful exploit could allow the attacker to cause the device to reload. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-ip-flood-dos-6hxxENVQ

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2022-20622
Cisco Bug IDsCSCvx88847
CVSS ScoreBase 8.6
Base 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco Aironet Access Point Software, Cisco Aironet Access Point Software (IOS XE Controller)

CSAF Product Statuses

Product Status Source CVE Rows
Cisco Aironet Access Point Software known_affected cisco_csaf CVE-2022-20622 1
Cisco Aironet Access Point Software (IOS XE Controller) known_affected cisco_csaf CVE-2022-20622 1

Related Products

Product CVE Evidence
Cisco Aironet Access Point Software CVE-2022-20622 Cisco OpenVuln
Cisco Aironet Access Point Software (IOS XE Controller) CVE-2022-20622 Cisco OpenVuln
Cisco IOS XE Software CVE-2022-20622 Cisco OpenVuln