CWE
78 20
Advisory Published
Updated

CVE-2023-20056: OS Command Injection

First published: Thu Mar 23 2023(Updated: )

A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco Wireless LAN Controller Software<8.10.183.0
Cisco Esw6300
Cisco Aironet Access Point Software<17.9.0.135
Cisco Aironet 1540
Cisco Aironet 1542d
Cisco Aironet 1542i
Cisco Aironet 1560
Cisco Aironet 1562d
Cisco Aironet 1562e
Cisco Aironet 1562i
Cisco Aironet 1800
Cisco Aironet 1800i
Cisco Aironet 1810
Cisco Aironet 1810w
Cisco Aironet 1815
Cisco Aironet 1815i
Cisco Aironet 1815m
Cisco Aironet 1815t
Cisco Aironet 1815w
Cisco Aironet 2800
Cisco Aironet 2800e
Cisco Aironet 2800i
Cisco Aironet 3800
Cisco Aironet 3800e
Cisco Aironet 3800i
Cisco Aironet 3800p
Cisco Aironet 4800
Cisco Catalyst 9100
Cisco Catalyst 9105
Cisco Catalyst 9105ax
Cisco Catalyst 9105axi
Cisco Catalyst 9105axw
Cisco Catalyst 9115
Cisco Catalyst 9115 Ap
Cisco Catalyst 9115ax
Cisco Catalyst 9115axe
Cisco Catalyst 9115axi
Cisco Catalyst 9117
Cisco Catalyst 9117 Ap
Cisco Catalyst 9117ax
Cisco Catalyst 9117axi
Cisco Catalyst 9120
Cisco Catalyst 9120 Ap
Cisco Catalyst 9120ax
Cisco Catalyst 9120axe
Cisco Catalyst 9120axi
Cisco Catalyst 9120axp
Cisco Catalyst 9124
Cisco Catalyst 9124ax
Cisco Catalyst 9124axd
Cisco Catalyst 9124axi
Cisco Catalyst 9130
Cisco Catalyst 9130 Ap
Cisco Catalyst 9130ax
Cisco Catalyst 9130axe
Cisco Catalyst 9130axi
Cisco Catalyst Iw6300
Cisco Catalyst Iw6300 Ac
Cisco Catalyst Iw6300 Dc
Cisco Catalyst Iw6300 Dcw
Cisco IOS XE<16.12.8
Cisco IOS XE>=17.1<17.3.6
Cisco IOS XE>=17.4<17.6.5
Cisco IOS XE>=17.7<17.9.2

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID of this Cisco access point software vulnerability?

    The vulnerability ID is CVE-2023-20056.

  • What is the severity rating of CVE-2023-20056?

    The severity rating of CVE-2023-20056 is medium with a score of 5.5.

  • How can an attacker exploit this vulnerability?

    An attacker can exploit this vulnerability by sending malicious commands through the management CLI of Cisco access point software.

  • Who is affected by this vulnerability?

    Users of Cisco Wireless LAN Controller Software versions up to 8.10.183.0 and Cisco Aironet Access Point Software versions up to 17.9.0.135 are affected by this vulnerability.

  • Is there a fix available for CVE-2023-20056?

    Yes, Cisco has released a security advisory with mitigation details for this vulnerability.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203