First published: Fri Sep 30 2022(Updated: )
A vulnerability in the Simple Network Management Protocol (SNMP) of Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family could allow an authenticated, remote attacker to access sensitive information. This vulnerability is due to insufficient restrictions that allow a sensitive configuration detail to be disclosed. An attacker could exploit this vulnerability by retrieving data through SNMP read-only community access. A successful exploit could allow the attacker to view Service Set Identifier (SSID) preshared keys (PSKs) that are configured on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | ||
Cisco Catalyst 9800 | ||
Cisco Catalyst 9800-40 | ||
Cisco Catalyst 9800-40 Wireless Controller | ||
Cisco Catalyst 9800-80 | ||
Cisco Catalyst 9800-80 Wireless Controller | ||
Cisco Catalyst 9800-cl | ||
Cisco Catalyst 9800-l | ||
Cisco Catalyst 9800-l-c | ||
Cisco Catalyst 9800-l-f | ||
Cisco Catalyst 9800 Embedded Wireless Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-20810.
The severity level of CVE-2022-20810 is medium.
The affected software is Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family.
An attacker can exploit CVE-2022-20810 by gaining authenticated remote access to the SNMP of the affected software.
Yes, Cisco has released a security advisory with guidance on how to mitigate the vulnerability. Please refer to the reference link for more information.