Lucene search

K
cve[email protected]CVE-2023-20056
HistoryMar 23, 2023 - 5:15 p.m.

CVE-2023-20056

2023-03-2317:15:14
CWE-78
web.nvd.nist.gov
40
vulnerability
management cli
cisco
access point
ap software
authenticated
local attacker
denial of service
dos
nvd

6.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.2%

A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition.

Affected configurations

NVD
Node
ciscowireless_lan_controller_softwareRange<8.10.183.0
AND
ciscoesw6300Match-
Node
ciscoaironet_access_point_softwareRange<17.9.0.135
AND
ciscoaironet_1540Match-
OR
ciscoaironet_1542dMatch-
OR
ciscoaironet_1542iMatch-
OR
ciscoaironet_1560Match-
OR
ciscoaironet_1562dMatch-
OR
ciscoaironet_1562eMatch-
OR
ciscoaironet_1562iMatch-
OR
ciscoaironet_1800Match-
OR
ciscoaironet_1800iMatch-
OR
ciscoaironet_1810Match-
OR
ciscoaironet_1810wMatch-
OR
ciscoaironet_1815Match-
OR
ciscoaironet_1815iMatch-
OR
ciscoaironet_1815mMatch-
OR
ciscoaironet_1815tMatch-
OR
ciscoaironet_1815wMatch-
OR
ciscoaironet_2800Match-
OR
ciscoaironet_2800eMatch-
OR
ciscoaironet_2800iMatch-
OR
ciscoaironet_3800Match-
OR
ciscoaironet_3800eMatch-
OR
ciscoaironet_3800iMatch-
OR
ciscoaironet_3800pMatch-
OR
ciscoaironet_4800Match-
OR
ciscocatalyst_9100Match-
OR
ciscocatalyst_9105Match-
OR
ciscocatalyst_9105axMatch-
OR
ciscocatalyst_9105axiMatch-
OR
ciscocatalyst_9105axwMatch-
OR
ciscocatalyst_9115Match-
OR
ciscocatalyst_9115_apMatch-
OR
ciscocatalyst_9115axMatch-
OR
ciscocatalyst_9115axeMatch-
OR
ciscocatalyst_9115axiMatch-
OR
ciscocatalyst_9117Match-
OR
ciscocatalyst_9117_apMatch-
OR
ciscocatalyst_9117axMatch-
OR
ciscocatalyst_9117axiMatch-
OR
ciscocatalyst_9120Match-
OR
ciscocatalyst_9120_apMatch-
OR
ciscocatalyst_9120axMatch-
OR
ciscocatalyst_9120axeMatch-
OR
ciscocatalyst_9120axiMatch-
OR
ciscocatalyst_9120axpMatch-
OR
ciscocatalyst_9124Match-
OR
ciscocatalyst_9124axMatch-
OR
ciscocatalyst_9124axdMatch-
OR
ciscocatalyst_9124axiMatch-
OR
ciscocatalyst_9130Match-
OR
ciscocatalyst_9130_apMatch-
OR
ciscocatalyst_9130axMatch-
OR
ciscocatalyst_9130axeMatch-
OR
ciscocatalyst_9130axiMatch-
OR
ciscocatalyst_iw6300Match-
OR
ciscocatalyst_iw6300_acMatch-
OR
ciscocatalyst_iw6300_dcMatch-
OR
ciscocatalyst_iw6300_dcwMatch-
Node
ciscoios_xeRange<16.12.8
OR
ciscoios_xeRange17.117.3.6
OR
ciscoios_xeRange17.417.6.5
OR
ciscoios_xeRange17.717.9.2

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Aironet Access Point Software ",
    "versions": [
      {
        "version": "n/a",
        "status": "affected"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

5.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.2%

Related for CVE-2023-20056