Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-20056


A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition.


Security Impact Summary

This vulnerability carries a MEDIUM severity rating with a CVSS v3.1 score of 6.5, requiring local system access to exploit with relatively low complexity without requiring user interaction requiring only low-level privileges . The vulnerability impacts and availability (service disruption) for affected systems. Impacting 61 products from cisco, from cisco, from cisco and 58 others, organizations running these solutions should prioritize assessment and patching.

Historical Context

Reported in 2023, this vulnerability emerged during an era marked by increased sophistication in supply chain attacks, cloud infrastructure vulnerabilities, and software-as-a-service (SaaS) security challenges. Security practices during this period emphasized zero-trust architectures, container security, and API protection.


Published

2023-03-23T17:15:14.220

Last Modified

2024-11-21T07:40:27.043

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-78
  • Type: Primary
    NVD-CWE-noinfo

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco wireless_lan_controller_software < 8.10.183.0 Yes
Hardware cisco esw6300 - No
Application cisco aironet_access_point_software < 17.9.0.135 Yes
Hardware cisco aironet_1540 - No
Hardware cisco aironet_1542d - No
Hardware cisco aironet_1542i - No
Hardware cisco aironet_1560 - No
Hardware cisco aironet_1562d - No
Hardware cisco aironet_1562e - No
Hardware cisco aironet_1562i - No
Hardware cisco aironet_1800 - No
Hardware cisco aironet_1800i - No
Hardware cisco aironet_1810 - No
Hardware cisco aironet_1810w - No
Hardware cisco aironet_1815 - No
Hardware cisco aironet_1815i - No
Hardware cisco aironet_1815m - No
Hardware cisco aironet_1815t - No
Hardware cisco aironet_1815w - No
Hardware cisco aironet_2800 - No
Hardware cisco aironet_2800e - No
Hardware cisco aironet_2800i - No
Hardware cisco aironet_3800 - No
Hardware cisco aironet_3800e - No
Hardware cisco aironet_3800i - No
Hardware cisco aironet_3800p - No
Hardware cisco aironet_4800 - No
Hardware cisco catalyst_9100 - No
Hardware cisco catalyst_9105 - No
Hardware cisco catalyst_9105ax - No
Hardware cisco catalyst_9105axi - No
Hardware cisco catalyst_9105axw - No
Hardware cisco catalyst_9115 - No
Hardware cisco catalyst_9115_ap - No
Hardware cisco catalyst_9115ax - No
Hardware cisco catalyst_9115axe - No
Hardware cisco catalyst_9115axi - No
Hardware cisco catalyst_9117 - No
Hardware cisco catalyst_9117_ap - No
Hardware cisco catalyst_9117ax - No
Hardware cisco catalyst_9117axi - No
Hardware cisco catalyst_9120 - No
Hardware cisco catalyst_9120_ap - No
Hardware cisco catalyst_9120ax - No
Hardware cisco catalyst_9120axe - No
Hardware cisco catalyst_9120axi - No
Hardware cisco catalyst_9120axp - No
Hardware cisco catalyst_9124 - No
Hardware cisco catalyst_9124ax - No
Hardware cisco catalyst_9124axd - No
Hardware cisco catalyst_9124axi - No
Hardware cisco catalyst_9130 - No
Hardware cisco catalyst_9130_ap - No
Hardware cisco catalyst_9130ax - No
Hardware cisco catalyst_9130axe - No
Hardware cisco catalyst_9130axi - No
Hardware cisco catalyst_iw6300 - No
Hardware cisco catalyst_iw6300_ac - No
Hardware cisco catalyst_iw6300_dc - No
Hardware cisco catalyst_iw6300_dcw - No
Operating System cisco ios_xe < 16.12.8 Yes
Operating System cisco ios_xe < 17.3.6 Yes
Operating System cisco ios_xe < 17.6.5 Yes
Operating System cisco ios_xe < 17.9.2 Yes

References

How SecUtils Interprets This CVE

SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For cisco's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.