CVE-2023-20112

HIGH

Cisco AP - DoS

Title source: llm
STIX 2.1

Description

A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.

References (1)

Core 1

Scores

CVSS v3 7.4
EPSS 0.0031
EPSS Percentile 53.9%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-125 CWE-126
Status published
Products (31)
cisco/business_150ax_firmware < 10.3.2.0
cisco/business_151axm_firmware < 10.3.2.0
cisco/catalyst_9105ax_firmware < 10.3.2.0
cisco/catalyst_9105axi_firmware < 10.3.2.0
cisco/catalyst_9105axw_firmware < 10.3.2.0
cisco/catalyst_9105i_firmware < 10.3.2.0
cisco/catalyst_9105w_firmware < 10.3.2.0
cisco/catalyst_9115_firmware < 10.3.2.0
cisco/catalyst_9115ax_firmware < 10.3.2.0
cisco/catalyst_9115axe_firmware < 10.3.2.0
... and 21 more
Published Mar 23, 2023
Tracked Since Feb 18, 2026