First published: Thu Mar 23 2023(Updated: )
A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Business 150AX Access Point firmware | <10.3.2.0 | |
Cisco Business 150AX Access Point firmware | ||
Cisco Business 151AXM | <10.3.2.0 | |
Cisco Business 151AXM Firmware | ||
Cisco Catalyst 9105 Firmware | <10.3.2.0 | |
Cisco Catalyst 9105 Firmware | ||
Cisco Catalyst 9105 Firmware | <10.3.2.0 | |
Cisco Catalyst 9105 Firmware | ||
Cisco Catalyst 9105 Firmware | <10.3.2.0 | |
Cisco Catalyst 9105AX | ||
Cisco Catalyst 9105 Firmware | <10.3.2.0 | |
Cisco Catalyst 9105 Firmware | ||
Cisco Catalyst 9105 Firmware | <10.3.2.0 | |
Cisco Catalyst 9105 Firmware | ||
Cisco Catalyst 9115AXI Firmware | <10.3.2.0 | |
Cisco Catalyst 9115 Firmware | ||
Cisco Catalyst 9115AX | <10.3.2.0 | |
Cisco Catalyst 9115 AP Firmware | ||
Cisco Catalyst 9115 AP Firmware | <10.3.2.0 | |
Cisco Catalyst 9115 AP Firmware | ||
Cisco Catalyst 9115 Firmware | <10.3.2.0 | |
Cisco Catalyst 9115AXI | ||
Cisco Catalyst 9117AX Firmware | <10.3.2.0 | |
Cisco Catalyst 9117 Firmware | ||
Cisco Catalyst 9117 Firmware | <10.3.2.0 | |
Cisco Catalyst 9117AX Firmware | ||
Cisco Catalyst 9117 Firmware | <10.3.2.0 | |
Cisco Catalyst 9117AX | ||
Cisco Catalyst 9120 Access Point Firmware | <10.3.2.0 | |
Cisco Catalyst 9120 Access Point Firmware | ||
Cisco Catalyst 9120 Firmware | <10.3.2.0 | |
Cisco Catalyst 9120 Firmware | ||
Cisco Catalyst 9120 Access Point Firmware | <10.3.2.0 | |
Cisco Catalyst 9120 Firmware | ||
Cisco Catalyst 9120 Firmware | <10.3.2.0 | |
Cisco Catalyst 9120 Firmware | ||
Cisco Catalyst 9120 Access Point Firmware | <10.3.2.0 | |
Cisco Catalyst 9120 Firmware | ||
Cisco Catalyst 9124AXD Firmware | <10.3.2.0 | |
Cisco Catalyst 9124 Firmware | ||
Cisco Catalyst 9124 Firmware | <10.3.2.0 | |
Cisco Catalyst 9124 Firmware | ||
Cisco Catalyst 9124 Firmware | <10.3.2.0 | |
Cisco Catalyst 9124 Firmware | ||
Cisco Catalyst 9124 Firmware | <10.3.2.0 | |
Cisco Catalyst 9124 Firmware | ||
Cisco Catalyst 9130AXE Firmware | <10.3.2.0 | |
Cisco Catalyst 9130 Access Point Firmware | ||
Cisco Catalyst 9130 Firmware | <10.3.2.0 | |
Cisco Catalyst 9130 Firmware | ||
Cisco Catalyst 9130 Firmware | <10.3.2.0 | |
Cisco Catalyst 9130 Firmware | ||
Cisco Catalyst 9130 Firmware | <10.3.2.0 | |
Cisco Catalyst 9130 Firmware | ||
Cisco Catalyst 9136 Firmware | <10.3.2.0 | |
Cisco Catalyst 9136 Firmware | ||
Cisco Catalyst 9162 Firmware | <10.3.2.0 | |
Cisco Catalyst 9162 Firmware | ||
Cisco Catalyst 9164 Firmware | <10.3.2.0 | |
Cisco Catalyst 9164 Firmware | ||
Cisco Catalyst 9166 Firmware | <10.3.2.0 | |
Cisco Catalyst 9166 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Affected devices include various Cisco access points running firmware versions up to but not including 10.3.2.0.
CVE-2023-20112 can lead to a denial of service (DoS) condition on the affected Cisco access points.
To mitigate CVE-2023-20112, upgrade the Cisco access point systems to a firmware version that is not vulnerable, specifically beyond 10.3.2.0.
CVE-2023-20112 requires an unauthenticated adjacent attacker to exploit the vulnerability.
The vulnerability stems from insufficient validation of parameters within 802.11 frames in Cisco access point software.