Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2023-20176


A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service. This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.


Published

2023-09-27T18:15:10.923

Last Modified

2024-11-21T07:40:45.027

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.8 (MEDIUM)

Weaknesses
  • Type: Secondary
    CWE-400
  • Type: Primary
    CWE-400

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco catalyst_9166_firmware < 17.6.6 Yes
Hardware cisco catalyst_9166 - No
Operating System cisco catalyst_9164_firmware < 17.6.6 Yes
Hardware cisco catalyst_9164 - No
Operating System cisco catalyst_9136_firmware < 17.6.6 Yes
Hardware cisco catalyst_9136 - No
Operating System cisco catalyst_9130_firmware < 17.6.6 Yes
Hardware cisco catalyst_9130 - No
Operating System cisco catalyst_9124_firmware < 17.6.6 Yes
Hardware cisco catalyst_9124 - No

References