Denial of service in Cisco Catalyst 9100 Series Access Points



Published: 2022-09-29
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-20945
CWE-ID CWE-119
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
Cisco Aironet 1540 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Aironet 1560 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Aironet 1800 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco 1810 Aironet Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Aironet 1815 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Aironet 1840 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Aironet 1850 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Aironet 2800 Series Access Points
Hardware solutions / Routers & switches, VoIP, GSM, etc

Cisco Catalyst 9800 Series Wireless Controllers
Hardware solutions / Routers & switches, VoIP, GSM, etc

Aironet 1810w Series Access Points
Other software / Other software solutions

Aironet 1830 Series Access Points
Other software / Other software solutions

Aironet 4800 Access Points
Other software / Other software solutions

Catalyst 9105AX Series Access Points
Other software / Other software solutions

Catalyst 9115AX Series Access Points
Other software / Other software solutions

Catalyst 9117AX Series Access Points
Other software / Other software solutions

Catalyst 9120AX Series Access Points
Other software / Other software solutions

Catalyst 9124AX Series
Other software / Other software solutions

Catalyst 9130AX Series Access Points
Other software / Other software solutions

Catalyst IW6300 Heavy Duty Series Access Points
Other software / Other software solutions

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Buffer overflow

EUVDB-ID: #VU67758

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-20945

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient input validation of certain parameters within association request frames received by the AP. A remote attacker can send specially crafted traffic to the device, trigger a buffer overflow and perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

Cisco Aironet 1540 Series Access Points: All versions

Cisco Aironet 1560 Series Access Points: All versions

Cisco Aironet 1800 Series Access Points: All versions

Cisco 1810 Aironet Access Points: All versions

Aironet 1810w Series Access Points: All versions

Cisco Aironet 1815 Series Access Points : All versions

Aironet 1830 Series Access Points: All versions

Cisco Aironet 1840 Series Access Points : All versions

Cisco Aironet 1850 Series Access Points: All versions

Cisco Aironet 2800 Series Access Points: All versions

Aironet 4800 Access Points: All versions

Catalyst 9105AX Series Access Points: All versions

Catalyst 9115AX Series Access Points: All versions

Catalyst 9117AX Series Access Points: All versions

Catalyst 9120AX Series Access Points: All versions

Catalyst 9124AX Series: All versions

Catalyst 9130AX Series Access Points: All versions

Catalyst IW6300 Heavy Duty Series Access Points: All versions

Cisco Catalyst 9800 Series Wireless Controllers: before 17.6.4

External links

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-assoc-dos-EgVqtON8
http://bst.cloudapps.cisco.com/bugsearch/bug/CSCwb38507


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###