A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service.
This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
History
No history.
Information
Published : 2023-09-27 18:15
Updated : 2024-01-25 17:15
NVD link : CVE-2023-20176
Mitre link : CVE-2023-20176
CVE.ORG link : CVE-2023-20176
JSON object : View
Products Affected
cisco
- catalyst_9164_firmware
- catalyst_9166_firmware
- catalyst_9130_firmware
- catalyst_9130
- catalyst_9136
- catalyst_9136_firmware
- catalyst_9124
- catalyst_9164
- catalyst_9166
- catalyst_9124_firmware
CWE
CWE-400
Uncontrolled Resource Consumption