Lucene search

K
prionPRIOn knowledge basePRION:CVE-2022-20769
HistorySep 30, 2022 - 7:15 p.m.

Design/Logic Flaw

2022-09-3019:15:00
PRIOn knowledge base
www.prio-n.com
1
logic flaw
authentication
cisco wireless lan controller
denial of service
crafted packets
fips mode

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.0%

A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error validation. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to cause the wireless LAN controller to crash, resulting in a DoS condition. Note: This vulnerability affects only devices that have Federal Information Processing Standards (FIPS) mode enabled.

6.5 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

20.0%

Related for PRION:CVE-2022-20769