A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.
This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of network requests to an affected device. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to reload, resulting in a DoS condition.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-wncd-HFGMsfSD | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-09-27 18:15
Updated : 2024-01-25 17:15
NVD link : CVE-2023-20202
Mitre link : CVE-2023-20202
CVE.ORG link : CVE-2023-20202
JSON object : View
Products Affected
cisco
- esw6300
- catalyst_9800-40
- catalyst_9162
- catalyst_9115
- catalyst_9124i
- catalyst_9124d
- catalyst_9800-cl
- catalyst_9120
- catalyst_9130
- catalyst_9124e
- ios_xe
- catalyst_9166
- catalyst_9105i
- catalyst_9136
- catalyst_9105w
- catalyst_9800-80
- catalyst_9800-l
- iw9167eh-x-ap
- catalyst_9166d1
- catalyst_iw6300
- iw9167ih-x-ap
- iw9167eh-x-urwb
- iw9167eh-x-wgb
- catalyst_9164
CWE