Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-20945 |
CWE-ID | CWE-119 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Cisco Aironet 1540 Series Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Aironet 1560 Series Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Aironet 1800 Series Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco 1810 Aironet Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Aironet 1815 Series Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Aironet 1840 Series Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Aironet 1850 Series Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Aironet 2800 Series Access Points Hardware solutions / Routers & switches, VoIP, GSM, etc Cisco Catalyst 9800 Series Wireless Controllers Hardware solutions / Routers & switches, VoIP, GSM, etc Aironet 1810w Series Access Points Other software / Other software solutions Aironet 1830 Series Access Points Other software / Other software solutions Aironet 4800 Access Points Other software / Other software solutions Catalyst 9105AX Series Access Points Other software / Other software solutions Catalyst 9115AX Series Access Points Other software / Other software solutions Catalyst 9117AX Series Access Points Other software / Other software solutions Catalyst 9120AX Series Access Points Other software / Other software solutions Catalyst 9124AX Series Other software / Other software solutions Catalyst 9130AX Series Access Points Other software / Other software solutions Catalyst IW6300 Heavy Duty Series Access Points Other software / Other software solutions |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU67758
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-20945
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient input validation of certain parameters within association request frames received by the AP. A remote attacker can send specially crafted traffic to the device, trigger a buffer overflow and perform a denial of service (DoS) attack.
Install updates from vendor's website.
Vulnerable software versionsCisco Aironet 1540 Series Access Points: All versions
Cisco Aironet 1560 Series Access Points: All versions
Cisco Aironet 1800 Series Access Points: All versions
Cisco 1810 Aironet Access Points: All versions
Aironet 1810w Series Access Points: All versions
Cisco Aironet 1815 Series Access Points : All versions
Aironet 1830 Series Access Points: All versions
Cisco Aironet 1840 Series Access Points : All versions
Cisco Aironet 1850 Series Access Points: All versions
Cisco Aironet 2800 Series Access Points: All versions
Aironet 4800 Access Points: All versions
Catalyst 9105AX Series Access Points: All versions
Catalyst 9115AX Series Access Points: All versions
Catalyst 9117AX Series Access Points: All versions
Catalyst 9120AX Series Access Points: All versions
Catalyst 9124AX Series: All versions
Catalyst 9130AX Series Access Points: All versions
Catalyst IW6300 Heavy Duty Series Access Points: All versions
Cisco Catalyst 9800 Series Wireless Controllers: before 17.6.4
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-assoc-dos-EgVqtON8
http://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb38507
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.