First published: Fri Sep 30 2022(Updated: )
A vulnerability in the client forwarding code of multiple Cisco Access Points (APs) could allow an unauthenticated, adjacent attacker to inject packets from the native VLAN to clients within nonnative VLANs on an affected device. This vulnerability is due to a logic error on the AP that forwards packets that are destined to a wireless client if they are received on the native VLAN. An attacker could exploit this vulnerability by obtaining access to the native VLAN and directing traffic directly to the client through their MAC/IP combination. A successful exploit could allow the attacker to bypass VLAN separation and potentially also bypass any Layer 3 protection mechanisms that are deployed.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Aironet 1542D | =017.006\(001\) | |
Cisco Aironet 1542D | ||
Cisco Aironet 1542i Firmware | =017.006\(001\) | |
Cisco Aironet 1542i Firmware | ||
Cisco Aironet 1562 firmware | =017.006\(001\) | |
Cisco Aironet 1562 firmware | ||
Cisco Aironet 1562E | =017.006\(001\) | |
Cisco Aironet 1562E Firmware | ||
Cisco Aironet 1562 firmware | =017.006\(001\) | |
Cisco Aironet 1562 firmware | ||
Cisco Aironet 1815 Firmware | =017.006\(001\) | |
Cisco Aironet 1815 Firmware | ||
Cisco Aironet 1815 Firmware | =017.006\(001\) | |
Cisco Aironet 1815 Firmware | ||
Cisco Aironet 1815 Firmware | =017.006\(001\) | |
Cisco Aironet 1815 Firmware | ||
Cisco Aironet 1815 Firmware | =017.006\(001\) | |
Cisco Aironet 1815 Firmware | ||
Cisco Aironet 1830i Firmware | =017.006\(001\) | |
Cisco Aironet 1830i Firmware | ||
Cisco Aironet 1840i Firmware | =017.006\(001\) | |
Cisco Aironet 1840i Firmware | ||
Cisco Aironet 1850E Firmware | =017.006\(001\) | |
Cisco Aironet 1850e Access Point | ||
Cisco Aironet 1850i Firmware | =017.006\(001\) | |
Cisco Aironet 1850i Access Point | ||
Cisco Aironet 2800 Firmware | =017.006\(001\) | |
Cisco Aironet 2800 Firmware | ||
Cisco Aironet 2800e Firmware | =017.006\(001\) | |
Cisco Aironet 2800e Firmware | ||
Cisco Aironet 3800 Firmware | =017.006\(001\) | |
Cisco Aironet 3800 Firmware | ||
Cisco Aironet 3800 Firmware | =017.006\(001\) | |
Cisco Aironet 3800E Firmware | ||
Cisco Aironet 3800 Firmware | =017.006\(001\) | |
Cisco Aironet 3800P Firmware | ||
Cisco Aironet 4800 Firmware | =017.006\(001\) | |
Cisco Aironet 4800 Firmware | ||
Cisco Catalyst 9105 Firmware | =017.006\(001\) | |
Cisco Catalyst 9105 Firmware | ||
Cisco Catalyst 9115AX | =017.006\(001\) | |
Cisco Catalyst 9115 AP Firmware | ||
Cisco Catalyst 9117 Firmware | =017.006\(001\) | |
Cisco Catalyst 9117AX Firmware | ||
Cisco Catalyst 9120 Firmware | =017.006\(001\) | |
Cisco Catalyst 9120 Firmware | ||
Cisco Catalyst 9124 Firmware | =017.006\(001\) | |
Cisco Catalyst 9124 Firmware | ||
Cisco Catalyst 9130 Firmware | =017.006\(001\) | |
Cisco Catalyst 9130 Firmware | ||
Cisco Catalyst IW6300 DC Firmware | =017.006\(001\) | |
Cisco Catalyst IW6300 AC Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20728 is a vulnerability in the client forwarding code of multiple Cisco Access Points (APs) that allows an unauthenticated, adjacent attacker to inject packets from the native VLAN to clients within nonnative VLANs.
CVE-2022-20728 affects multiple Cisco Access Points (APs) by allowing an attacker to inject packets from the native VLAN to clients within nonnative VLANs.
CVE-2022-20728 has a severity rating of 4.7 out of 10, which is considered medium severity.
To fix CVE-2022-20728, Cisco has released a software update. Please refer to the Cisco Security Advisory for specific instructions.
You can find more information about CVE-2022-20728 in the Cisco Security Advisory.