Lucene search

K
cve[email protected]CVE-2023-20067
HistoryMar 23, 2023 - 5:15 p.m.

CVE-2023-20067

2023-03-2317:15:14
CWE-770
web.nvd.nist.gov
46
cve-2023-20067
cisco
ios xe
wireless lan controllers
wlcs
dos
vulnerability
security
nvd

7.4 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

6.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.9%

A vulnerability in the HTTP-based client profiling feature of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of received traffic. An attacker could exploit this vulnerability by sending crafted traffic through a wireless access point. A successful exploit could allow the attacker to cause CPU utilization to increase, which could result in a DoS condition on an affected device and could cause new wireless client associations to fail. Once the offending traffic stops, the affected system will return to an operational state and new client associations will succeed.

Affected configurations

NVD
Node
ciscoios_xeMatch16.10.1
OR
ciscoios_xeMatch16.10.1e
OR
ciscoios_xeMatch16.10.1s
OR
ciscoios_xeMatch16.11.1
OR
ciscoios_xeMatch16.11.1a
OR
ciscoios_xeMatch16.11.1b
OR
ciscoios_xeMatch16.11.1c
OR
ciscoios_xeMatch16.11.2
OR
ciscoios_xeMatch16.12.1
OR
ciscoios_xeMatch16.12.1s
OR
ciscoios_xeMatch16.12.1t
OR
ciscoios_xeMatch16.12.2s
OR
ciscoios_xeMatch16.12.2t
OR
ciscoios_xeMatch16.12.3
OR
ciscoios_xeMatch16.12.3s
OR
ciscoios_xeMatch16.12.4
OR
ciscoios_xeMatch16.12.4a
OR
ciscoios_xeMatch16.12.5
OR
ciscoios_xeMatch16.12.6
OR
ciscoios_xeMatch16.12.6a
OR
ciscoios_xeMatch16.12.7
OR
ciscoios_xeMatch16.12.8
OR
ciscoios_xeMatch17.1.1
OR
ciscoios_xeMatch17.1.1s
OR
ciscoios_xeMatch17.1.1t
OR
ciscoios_xeMatch17.1.2
OR
ciscoios_xeMatch17.1.3
OR
ciscoios_xeMatch17.2.1
OR
ciscoios_xeMatch17.2.1a
OR
ciscoios_xeMatch17.3.1
OR
ciscoios_xeMatch17.3.2
OR
ciscoios_xeMatch17.3.2a
OR
ciscoios_xeMatch17.3.3
OR
ciscoios_xeMatch17.3.4
OR
ciscoios_xeMatch17.3.4c
OR
ciscoios_xeMatch17.3.5
OR
ciscoios_xeMatch17.3.5a
OR
ciscoios_xeMatch17.3.5b
OR
ciscoios_xeMatch17.3.6
OR
ciscoios_xeMatch17.4.1
OR
ciscoios_xeMatch17.5.1
OR
ciscoios_xeMatch17.6.1
OR
ciscoios_xeMatch17.6.2
OR
ciscoios_xeMatch17.6.3
OR
ciscoios_xeMatch17.6.4
OR
ciscoios_xeMatch17.7.1
OR
ciscoios_xeMatch17.8.1
OR
ciscoios_xeMatch17.9.1

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco IOS XE Software ",
    "versions": [
      {
        "version": "n/a",
        "status": "affected"
      }
    ]
  }
]

7.4 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

6.5 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.9%

Related for CVE-2023-20067