Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-20769


A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error validation. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to cause the wireless LAN controller to crash, resulting in a DoS condition. Note: This vulnerability affects only devices that have Federal Information Processing Standards (FIPS) mode enabled.


Published

2022-09-30T19:15:11.217

Last Modified

2024-11-21T06:43:31.107

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.4 (HIGH)

Weaknesses
  • Type: Secondary
    CWE-787
  • Type: Primary
    CWE-787

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco wireless_lan_controller_software < 8.10.171.0 Yes
Application cisco virtual_wireless_controller - No
Hardware cisco 2504_wireless_lan_controller - No
Hardware cisco 3504_wireless_lan_controller - No
Hardware cisco 5508_wireless_lan_controller - No
Hardware cisco 5520_wireless_lan_controller - No
Hardware cisco 8540_wireless_lan_controller - No
Hardware cisco flex_7510 - No

References