A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service. This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.
2023-09-27T18:15:10.923
2024-11-21T07:40:45.027
Modified
CVSSv3.1: 5.8 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | cisco | catalyst_9166_firmware | < 17.6.6 | Yes |
Hardware | cisco | catalyst_9166 | - | No |
Operating System | cisco | catalyst_9164_firmware | < 17.6.6 | Yes |
Hardware | cisco | catalyst_9164 | - | No |
Operating System | cisco | catalyst_9136_firmware | < 17.6.6 | Yes |
Hardware | cisco | catalyst_9136 | - | No |
Operating System | cisco | catalyst_9130_firmware | < 17.6.6 | Yes |
Hardware | cisco | catalyst_9130 | - | No |
Operating System | cisco | catalyst_9124_firmware | < 17.6.6 | Yes |
Hardware | cisco | catalyst_9124 | - | No |