CVE-2023-20112

moderate-risk
Published 2023-03-23

A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.

Do I need to act?

-
0.31% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.4/10 High
ADJACENT_NETWORK / LOW complexity

Affected Products (20)

Business 150Ax Firmware
Business 151Axm Firmware
Catalyst 9105Ax Firmware
Catalyst 9105Axi Firmware
Catalyst 9105Axw Firmware
Catalyst 9105I Firmware
Catalyst 9105W Firmware
Catalyst 9115 Firmware
Catalyst 9115Ax Firmware
Catalyst 9115Axe Firmware
Catalyst 9115Axi Firmware
Catalyst 9117 Firmware
Catalyst 9117Ax Firmware
Catalyst 9117Axi Firmware
Catalyst 9120 Firmware
Catalyst 9120Ax Firmware
Catalyst 9120Axe Firmware
Catalyst 9120Axi Firmware
Catalyst 9120Axp Firmware
Catalyst 9124 Firmware

Affected Vendors

47
/ 100
moderate-risk
Severity 23/34 · High
Exploitability 1/34 · Minimal
Exposure 23/34 · High