A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.

Project Subscriptions

Vendors Products
Business 150ax Subscribe
Business 150ax Firmware Subscribe
Business 151axm Subscribe
Business 151axm Firmware Subscribe
Catalyst 9105ax Subscribe
Catalyst 9105ax Firmware Subscribe
Catalyst 9105axi Subscribe
Catalyst 9105axi Firmware Subscribe
Catalyst 9105axw Subscribe
Catalyst 9105axw Firmware Subscribe
Catalyst 9105i Subscribe
Catalyst 9105i Firmware Subscribe
Catalyst 9105w Subscribe
Catalyst 9105w Firmware Subscribe
Catalyst 9115 Subscribe
Catalyst 9115 Firmware Subscribe
Catalyst 9115ax Subscribe
Catalyst 9115ax Firmware Subscribe
Catalyst 9115axe Subscribe
Catalyst 9115axe Firmware Subscribe
Catalyst 9115axi Subscribe
Catalyst 9115axi Firmware Subscribe
Catalyst 9117 Subscribe
Catalyst 9117 Firmware Subscribe
Catalyst 9117ax Subscribe
Catalyst 9117ax Firmware Subscribe
Catalyst 9117axi Subscribe
Catalyst 9117axi Firmware Subscribe
Catalyst 9120 Subscribe
Catalyst 9120 Firmware Subscribe
Catalyst 9120ax Subscribe
Catalyst 9120ax Firmware Subscribe
Catalyst 9120axe Subscribe
Catalyst 9120axe Firmware Subscribe
Catalyst 9120axi Subscribe
Catalyst 9120axi Firmware Subscribe
Catalyst 9120axp Subscribe
Catalyst 9120axp Firmware Subscribe
Catalyst 9124 Subscribe
Catalyst 9124 Firmware Subscribe
Catalyst 9124ax Subscribe
Catalyst 9124ax Firmware Subscribe
Catalyst 9124axd Subscribe
Catalyst 9124axd Firmware Subscribe
Catalyst 9124axi Subscribe
Catalyst 9124axi Firmware Subscribe
Catalyst 9130 Subscribe
Catalyst 9130 Firmware Subscribe
Catalyst 9130ax Subscribe
Catalyst 9130ax Firmware Subscribe
Catalyst 9130axe Subscribe
Catalyst 9130axe Firmware Subscribe
Catalyst 9130axi Subscribe
Catalyst 9130axi Firmware Subscribe
Catalyst 9136 Subscribe
Catalyst 9136 Firmware Subscribe
Catalyst 9162 Subscribe
Catalyst 9162 Firmware Subscribe
Catalyst 9164 Subscribe
Catalyst 9164 Firmware Subscribe
Catalyst 9166 Subscribe
Catalyst 9166 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-24291 A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 25 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-10-25T16:02:04.798Z

Reserved: 2022-10-27T00:00:00

Link: CVE-2023-20112

cve-icon Vulnrichment

Updated: 2024-08-02T08:57:35.895Z

cve-icon NVD

Status : Modified

Published: 2023-03-23T17:15:15.267

Modified: 2024-11-21T07:40:34.933

Link: CVE-2023-20112

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses