Vulnerability Details : CVE-2023-20112
A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.
Vulnerability category: Denial of service
Products affected by CVE-2023-20112
- cpe:2.3:o:cisco:catalyst_9105axi_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9115axe_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9117_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9120axi_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9124axd_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9130axe_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9105axw_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9115axi_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9120axp_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9120axe_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9124axi_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9130axi_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9115_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9117axi_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9120_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9124_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9130_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9105ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9115ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9117ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9120ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9124ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9130ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:business_150ax_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:business_151axm_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9105i_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9105w_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9136_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9162_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9164_firmware:*:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:catalyst_9166_firmware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-20112
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 19 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-20112
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.4
|
HIGH | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
2.8
|
4.0
|
Cisco Systems, Inc. | |
6.5
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2023-20112
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
-
The product reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.Assigned by: ykramarz@cisco.com (Secondary)
References for CVE-2023-20112
-
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-assoc-dos-D2SunWK2
Cisco Access Point Software Association Request Denial of Service VulnerabilityVendor Advisory
Jump to