Description
A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.
References (1)
Core 1
Core References
Vendor Advisory vendor-advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-assoc-dos-D2SunWK2
Scores
CVSS v3
7.4
EPSS
0.0031
EPSS Percentile
53.9%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-125
CWE-126
Status
published
Products (31)
cisco/business_150ax_firmware
< 10.3.2.0
cisco/business_151axm_firmware
< 10.3.2.0
cisco/catalyst_9105ax_firmware
< 10.3.2.0
cisco/catalyst_9105axi_firmware
< 10.3.2.0
cisco/catalyst_9105axw_firmware
< 10.3.2.0
cisco/catalyst_9105i_firmware
< 10.3.2.0
cisco/catalyst_9105w_firmware
< 10.3.2.0
cisco/catalyst_9115_firmware
< 10.3.2.0
cisco/catalyst_9115ax_firmware
< 10.3.2.0
cisco/catalyst_9115axe_firmware
< 10.3.2.0
... and 21 more
Published
Mar 23, 2023
Tracked Since
Feb 18, 2026