Vulnslist

find the latest Cisco vulnerabilities

Cisco Catalyst 9100 Access Points Denial of Service Vulnerability

cisco-sa-click-ap-dos-wdcXkvnQ · Medium · Published · Updated

A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service. This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2023-20176
Cisco Bug IDsCSCwb56120
CVSS ScoreBase 5.8
Base 5.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L/E:X/RL:X/RC:X
Product Names From Source
Cisco Aironet Access Point Software, Cisco Aironet Access Point Software (IOS XE Controller)

CSAF Product Statuses

Product Status Source CVE Rows
Cisco Aironet Access Point Software known_affected cisco_csaf CVE-2023-20176 1
Cisco Aironet Access Point Software (IOS XE Controller) known_affected cisco_csaf CVE-2023-20176 1

Related Products

Product CVE Evidence
Cisco Aironet Access Point Software CVE-2023-20176 Cisco OpenVuln
Cisco Aironet Access Point Software (IOS XE Controller) CVE-2023-20176 Cisco OpenVuln
Cisco IOS XE Software CVE-2023-20176 Cisco OpenVuln