CVE-2023-20112
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
23/03/2023
Last modified:
07/11/2023
Description
A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:business_150ax_firmware:*:*:*:*:*:*:*:* | 10.3.2.0 (excluding) | |
| cpe:2.3:h:cisco:business_150ax:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:business_151axm_firmware:*:*:*:*:*:*:*:* | 10.3.2.0 (excluding) | |
| cpe:2.3:h:cisco:business_151axm:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:catalyst_9105ax_firmware:*:*:*:*:*:*:*:* | 10.3.2.0 (excluding) | |
| cpe:2.3:h:cisco:catalyst_9105ax:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:catalyst_9105axi_firmware:*:*:*:*:*:*:*:* | 10.3.2.0 (excluding) | |
| cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:catalyst_9105axw_firmware:*:*:*:*:*:*:*:* | 10.3.2.0 (excluding) | |
| cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:catalyst_9105i_firmware:*:*:*:*:*:*:*:* | 10.3.2.0 (excluding) | |
| cpe:2.3:h:cisco:catalyst_9105i:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:catalyst_9105w_firmware:*:*:*:*:*:*:*:* | 10.3.2.0 (excluding) | |
| cpe:2.3:h:cisco:catalyst_9105w:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:catalyst_9115_firmware:*:*:*:*:*:*:*:* | 10.3.2.0 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



