First published: Fri Sep 30 2022(Updated: )
A vulnerability in the 802.11 association frame validation of Cisco Catalyst 9100 Series Access Points (APs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of certain parameters within association request frames received by the AP. An attacker could exploit this vulnerability by sending a crafted 802.11 association request to a nearby device. An exploit could allow the attacker to unexpectedly reload the device, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Catalyst 9800-l Firmware | >=17.6<17.6.4 | |
Cisco Catalyst 9800-l | ||
Cisco Catalyst 9800-40 Firmware | >=17.6<17.6.4 | |
Cisco Catalyst 9800-40 | ||
Cisco Catalyst 9800-80 Firmware | >=17.6<17.6.4 | |
Cisco Catalyst 9800-80 | ||
Cisco Catalyst 9800-cl Firmware | >=17.6<17.6.4 | |
Cisco Catalyst 9800-cl |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-20945.
The severity of CVE-2022-20945 is high.
An attacker can exploit CVE-2022-20945 by sending malicious 802.11 association frames to a vulnerable Cisco Catalyst 9100 Series Access Point.
Yes, Cisco has released a software update to address the vulnerability. Refer to the Cisco Security Advisory for more information.
You can find more information about CVE-2022-20945 in the Cisco Security Advisory.