First published: Wed Sep 27 2023(Updated: )
A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of network requests to an affected device. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to reload, resulting in a DoS condition.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | =17.9.1 | |
Cisco IOS XE | =17.9.1a | |
Cisco IOS XE | =17.9.1w | |
Cisco IOS XE | =17.9.1x | |
Cisco IOS XE | =17.9.1x1 | |
Cisco IOS XE | =17.9.1y | |
Cisco IOS XE | =17.9.2 | |
Cisco IOS XE | =17.9.2a | |
Cisco IOS XE | =17.9.2b | |
Cisco IOS XE | =17.10.1 | |
Cisco IOS XE | =17.10.1a | |
Cisco IOS XE | =17.10.1b | |
Cisco Catalyst 9105i | ||
Cisco Catalyst 9105w | ||
Cisco Catalyst 9115 | ||
Cisco Catalyst 9120 | ||
Cisco Catalyst 9124d | ||
Cisco Catalyst 9124e | ||
Cisco Catalyst 9124i | ||
Cisco Catalyst 9130 | ||
Cisco Catalyst 9136 | ||
Cisco Catalyst 9162 | ||
Cisco Catalyst 9164 | ||
Cisco Catalyst 9166 | ||
Cisco Catalyst 9166d1 | ||
Cisco Catalyst 9800-40 | ||
Cisco Catalyst 9800-80 | ||
Cisco Catalyst 9800-cl | ||
Cisco Catalyst 9800-l | ||
Cisco Catalyst Iw6300 | ||
Cisco Esw6300 | ||
Cisco Iw9167eh-x-ap | ||
Cisco Iw9167eh-x-urwb | ||
Cisco Iw9167eh-x-wgb | ||
Cisco Iw9167ih-x-ap | ||
All of | ||
Any of | ||
Cisco IOS XE | =17.9.1 | |
Cisco IOS XE | =17.9.1a | |
Cisco IOS XE | =17.9.1w | |
Cisco IOS XE | =17.9.1x | |
Cisco IOS XE | =17.9.1x1 | |
Cisco IOS XE | =17.9.1y | |
Cisco IOS XE | =17.9.2 | |
Cisco IOS XE | =17.9.2a | |
Cisco IOS XE | =17.9.2b | |
Cisco IOS XE | =17.10.1 | |
Cisco IOS XE | =17.10.1a | |
Cisco IOS XE | =17.10.1b | |
Any of | ||
Cisco Catalyst 9105i | ||
Cisco Catalyst 9105w | ||
Cisco Catalyst 9115 | ||
Cisco Catalyst 9120 | ||
Cisco Catalyst 9124d | ||
Cisco Catalyst 9124e | ||
Cisco Catalyst 9124i | ||
Cisco Catalyst 9130 | ||
Cisco Catalyst 9136 | ||
Cisco Catalyst 9162 | ||
Cisco Catalyst 9164 | ||
Cisco Catalyst 9166 | ||
Cisco Catalyst 9166d1 | ||
Cisco Catalyst 9800-40 | ||
Cisco Catalyst 9800-80 | ||
Cisco Catalyst 9800-cl | ||
Cisco Catalyst 9800-l | ||
Cisco Catalyst Iw6300 | ||
Cisco Esw6300 | ||
Cisco Iw9167eh-x-ap | ||
Cisco Iw9167eh-x-urwb | ||
Cisco Iw9167eh-x-wgb | ||
Cisco Iw9167ih-x-ap |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20202 is a vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers that could allow a denial of service (DoS) attack.
CVE-2023-20202 affects Cisco IOS XE Software for Wireless LAN Controllers.
CVE-2023-20202 has a severity rating of 6.1 (medium).
CVE-2023-20202 is caused by improper memory management in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software.
To mitigate CVE-2023-20202, it is recommended to apply the necessary updates or patches provided by Cisco.