CVE-2022-20945
HIGHCisco Catalyst 9800-l Firmware < 17.6.4 - Improper Input Validation
Title source: ruleDescription
A vulnerability in the 802.11 association frame validation of Cisco Catalyst 9100 Series Access Points (APs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of certain parameters within association request frames received by the AP. An attacker could exploit this vulnerability by sending a crafted 802.11 association request to a nearby device. An exploit could allow the attacker to unexpectedly reload the device, resulting in a DoS condition.
References (1)
Core 1
Core References
Vendor Advisory vendor-advisory
x_refsource_cisco
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-assoc-dos-EgVqtON8
Scores
CVSS v3
7.4
EPSS
0.0011
EPSS Percentile
28.3%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-20
CWE-120
Status
published
Products (4)
cisco/catalyst_9800-40_firmware
17.6 - 17.6.4
cisco/catalyst_9800-80_firmware
17.6 - 17.6.4
cisco/catalyst_9800-cl_firmware
17.6 - 17.6.4
cisco/catalyst_9800-l_firmware
17.6 - 17.6.4
Published
Sep 30, 2022
Tracked Since
Feb 18, 2026