First published: Fri Apr 15 2022(Updated: )
A vulnerability in the Application Visibility and Control (AVC-FNF) feature of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient packet verification for traffic inspected by the AVC feature. An attacker could exploit this vulnerability by sending crafted packets from the wired network to a wireless client, resulting in the crafted packets being processed by the wireless controller. A successful exploit could allow the attacker to cause a crash and reload of the affected device, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Software | =3.15.1xbs | |
Cisco IOS XE Software | =3.15.2xbs | |
Cisco IOS XE Software | =16.7.2 | |
Cisco IOS XE Software | =16.7.3 | |
Cisco IOS XE Software | =16.7.4 | |
Cisco IOS XE Software | =16.8.1 | |
Cisco IOS XE Software | =16.8.1a | |
Cisco IOS XE Software | =16.8.1b | |
Cisco IOS XE Software | =16.8.1c | |
Cisco IOS XE Software | =16.8.1d | |
Cisco IOS XE Software | =16.8.1e | |
Cisco IOS XE Software | =16.8.1s | |
Cisco IOS XE Software | =16.8.2 | |
Cisco IOS XE Software | =16.8.3 | |
Cisco IOS XE Software | =16.9.1 | |
Cisco IOS XE Software | =16.9.1a | |
Cisco IOS XE Software | =16.9.1b | |
Cisco IOS XE Software | =16.9.1c | |
Cisco IOS XE Software | =16.9.1d | |
Cisco IOS XE Software | =16.9.1s | |
Cisco IOS XE Software | =16.9.2 | |
Cisco IOS XE Software | =16.9.2a | |
Cisco IOS XE Software | =16.9.2s | |
Cisco IOS XE Software | =16.9.3 | |
Cisco IOS XE Software | =16.9.3a | |
Cisco IOS XE Software | =16.9.3h | |
Cisco IOS XE Software | =16.9.3s | |
Cisco IOS XE Software | =16.9.4 | |
Cisco IOS XE Software | =16.9.4c | |
Cisco IOS XE Software | =16.9.5 | |
Cisco IOS XE Software | =16.9.5f | |
Cisco IOS XE Software | =16.9.6 | |
Cisco IOS XE Software | =16.9.7 | |
Cisco IOS XE Software | =16.9.8 | |
Cisco IOS XE Software | =16.10.1 | |
Cisco IOS XE Software | =16.10.1a | |
Cisco IOS XE Software | =16.10.1b | |
Cisco IOS XE Software | =16.10.1c | |
Cisco IOS XE Software | =16.10.1d | |
Cisco IOS XE Software | =16.10.1e | |
Cisco IOS XE Software | =16.10.1f | |
Cisco IOS XE Software | =16.10.1g | |
Cisco IOS XE Software | =16.10.1s | |
Cisco IOS XE Software | =16.10.2 | |
Cisco IOS XE Software | =16.10.3 | |
Cisco IOS XE Software | =16.11.1 | |
Cisco IOS XE Software | =16.11.1a | |
Cisco IOS XE Software | =16.11.1b | |
Cisco IOS XE Software | =16.11.1c | |
Cisco IOS XE Software | =16.11.1s | |
Cisco IOS XE Software | =16.11.2 | |
Cisco IOS XE Software | =16.12.1 | |
Cisco IOS XE Software | =16.12.1a | |
Cisco IOS XE Software | =16.12.1c | |
Cisco IOS XE Software | =16.12.1s | |
Cisco IOS XE Software | =16.12.1t | |
Cisco IOS XE Software | =16.12.1w | |
Cisco IOS XE Software | =16.12.1x | |
Cisco IOS XE Software | =16.12.1y | |
Cisco IOS XE Software | =16.12.1z | |
Cisco IOS XE Software | =16.12.1z1 | |
Cisco IOS XE Software | =16.12.1z2 | |
Cisco IOS XE Software | =16.12.2 | |
Cisco IOS XE Software | =16.12.2a | |
Cisco IOS XE Software | =16.12.2s | |
Cisco IOS XE Software | =16.12.2t | |
Cisco IOS XE Software | =16.12.3 | |
Cisco IOS XE Software | =16.12.3a | |
Cisco IOS XE Software | =16.12.3s | |
Cisco IOS XE Software | =16.12.4 | |
Cisco IOS XE Software | =16.12.4a | |
Cisco IOS XE Software | =16.12.5 | |
Cisco IOS XE Software | =16.12.5a | |
Cisco IOS XE Software | =16.12.5b | |
Cisco IOS XE Software | =16.12.6 | |
Cisco IOS XE Software | =16.12.6a | |
Cisco IOS XE Software | =17.1.1 | |
Cisco IOS XE Software | =17.1.1a | |
Cisco IOS XE Software | =17.1.1s | |
Cisco IOS XE Software | =17.1.1t | |
Cisco IOS XE Software | =17.1.2 | |
Cisco IOS XE Software | =17.1.3 | |
Cisco IOS XE Software | =17.2.1 | |
Cisco IOS XE Software | =17.2.1a | |
Cisco IOS XE Software | =17.2.1r | |
Cisco IOS XE Software | =17.2.1v | |
Cisco IOS XE Software | =17.2.2 | |
Cisco IOS XE Software | =17.2.3 | |
Cisco IOS XE Software | =17.3.1 | |
Cisco IOS XE Software | =17.3.1a | |
Cisco IOS XE Software | =17.3.1w | |
Cisco IOS XE Software | =17.3.1x | |
Cisco IOS XE Software | =17.3.1z | |
Cisco IOS XE Software | =17.3.2 | |
Cisco IOS XE Software | =17.3.2a | |
Cisco IOS XE Software | =17.4.1 | |
Cisco IOS XE Software | =17.4.1a | |
Cisco IOS XE Software | =17.4.1b | |
Cisco IOS XE Software | =17.4.1c | |
Cisco IOS XE Software | =17.4.2 | |
Cisco IOS XE Software | =17.4.2a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-20683 is considered high due to its potential to cause a denial of service condition.
To fix CVE-2022-20683, you should upgrade the Cisco IOS XE Software to the latest available version that addresses the vulnerability.
CVE-2022-20683 affects specific versions of Cisco IOS XE Software running on Catalyst 9800 Series Wireless Controllers.
In the context of CVE-2022-20683, a denial of service means that an attacker can disrupt legitimate access to network services on affected devices.
Yes, CVE-2022-20683 can be exploited by unauthenticated remote attackers to cause a denial of service.