First published: Fri Sep 30 2022(Updated: )
A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error validation. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to cause the wireless LAN controller to crash, resulting in a DoS condition. Note: This vulnerability affects only devices that have Federal Information Processing Standards (FIPS) mode enabled.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controller Software | <8.10.171.0 | |
Cisco Virtual Wireless Controller | ||
Cisco 2504 Wireless Lan Controller | ||
Cisco 3504 Wireless Lan Controller | ||
Cisco 5508 Wireless Lan Controller | ||
Cisco 5520 Wireless Lan Controller | ||
Cisco 8540 Wireless Lan Controller | ||
Cisco Flex 7510 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-20769 is a vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software that could allow an unauthenticated attacker to cause a denial of service (DoS) condition on an affected device.
CVE-2022-20769 could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.
CVE-2022-20769 has a severity rating of 6.5 (High).
No, Cisco Virtual Wireless Controller is not affected by CVE-2022-20769.
Cisco has released software updates to address CVE-2022-20769. It is recommended to update to the latest version of Cisco Wireless LAN Controller (WLC) AireOS Software.