A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error validation. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to cause the wireless LAN controller to crash, resulting in a DoS condition. Note: This vulnerability affects only devices that have Federal Information Processing Standards (FIPS) mode enabled.
Metrics
Affected Vendors & Products
References
History
Wed, 06 Nov 2024 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2022-09-30T18:45:21.833116Z
Updated: 2024-11-06T16:04:50.388Z
Reserved: 2021-11-02T00:00:00
Link: CVE-2022-20769
Vulnrichment
Updated: 2024-08-03T02:24:49.354Z
NVD
Status : Modified
Published: 2022-09-30T19:15:11.217
Modified: 2024-11-21T06:43:31.107
Link: CVE-2022-20769
Redhat
No data.