8.6

CVE-2023-20176

A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service.

 This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.

Data is provided by the National Vulnerability Database (NVD)
CiscoCatalyst 9166 Firmware Version < 17.6.6
   CiscoCatalyst 9166 Version-
CiscoCatalyst 9164 Firmware Version < 17.6.6
   CiscoCatalyst 9164 Version-
CiscoCatalyst 9136 Firmware Version < 17.6.6
   CiscoCatalyst 9136 Version-
CiscoCatalyst 9130 Firmware Version < 17.6.6
   CiscoCatalyst 9130 Version-
CiscoCatalyst 9124 Firmware Version < 17.6.6
   CiscoCatalyst 9124 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.12% 0.283
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
psirt@cisco.com 5.8 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.