Metrics
No CVSS v4.0
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required None
Scope Changed
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
No CVSS v3.0
No CVSS v2
This CVE is not in the KEV list.
The EPSS score is 0.00055.
Exploitation none
Automatable no
Technical Impact partial
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Business 150ax
Subscribe
Business 150ax Firmware
Subscribe
Business 151axm
Subscribe
Business 151axm Firmware
Subscribe
Catalyst 9105ax
Subscribe
Catalyst 9105ax Firmware
Subscribe
Catalyst 9105axi
Subscribe
Catalyst 9105axi Firmware
Subscribe
Catalyst 9105axw
Subscribe
Catalyst 9105axw Firmware
Subscribe
Catalyst 9105i
Subscribe
Catalyst 9105i Firmware
Subscribe
Catalyst 9105w
Subscribe
Catalyst 9105w Firmware
Subscribe
Catalyst 9115
Subscribe
Catalyst 9115 Firmware
Subscribe
Catalyst 9115ax
Subscribe
Catalyst 9115ax Firmware
Subscribe
Catalyst 9115axe
Subscribe
Catalyst 9115axe Firmware
Subscribe
Catalyst 9115axi
Subscribe
Catalyst 9115axi Firmware
Subscribe
Catalyst 9117
Subscribe
Catalyst 9117 Firmware
Subscribe
Catalyst 9117ax
Subscribe
Catalyst 9117ax Firmware
Subscribe
Catalyst 9117axi
Subscribe
Catalyst 9117axi Firmware
Subscribe
Catalyst 9120
Subscribe
Catalyst 9120 Firmware
Subscribe
Catalyst 9120ax
Subscribe
Catalyst 9120ax Firmware
Subscribe
Catalyst 9120axe
Subscribe
Catalyst 9120axe Firmware
Subscribe
Catalyst 9120axi
Subscribe
Catalyst 9120axi Firmware
Subscribe
Catalyst 9120axp
Subscribe
Catalyst 9120axp Firmware
Subscribe
Catalyst 9124
Subscribe
Catalyst 9124 Firmware
Subscribe
Catalyst 9124ax
Subscribe
Catalyst 9124ax Firmware
Subscribe
Catalyst 9124axd
Subscribe
Catalyst 9124axd Firmware
Subscribe
Catalyst 9124axi
Subscribe
Catalyst 9124axi Firmware
Subscribe
Catalyst 9130
Subscribe
Catalyst 9130 Firmware
Subscribe
Catalyst 9130ax
Subscribe
Catalyst 9130ax Firmware
Subscribe
Catalyst 9130axe
Subscribe
Catalyst 9130axe Firmware
Subscribe
Catalyst 9130axi
Subscribe
Catalyst 9130axi Firmware
Subscribe
Catalyst 9136
Subscribe
Catalyst 9136 Firmware
Subscribe
Catalyst 9162
Subscribe
Catalyst 9162 Firmware
Subscribe
Catalyst 9164
Subscribe
Catalyst 9164 Firmware
Subscribe
Catalyst 9166
Subscribe
Catalyst 9166 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-24291 | A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 25 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-10-25T16:02:04.798Z
Reserved: 2022-10-27T00:00:00
Link: CVE-2023-20112
Updated: 2024-08-02T08:57:35.895Z
Status : Modified
Published: 2023-03-23T17:15:15.267
Modified: 2024-11-21T07:40:34.933
Link: CVE-2023-20112
No data.
OpenCVE Enrichment
No data.
EUVD