A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
History
21 Nov 2024, 07:40
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-cli-dos-tc2EKEpu - Vendor Advisory |
30 Mar 2023, 19:18
Type | Values Removed | Values Added |
---|---|---|
First Time |
Cisco aironet Access Point Software
Cisco aironet 1542d Cisco catalyst 9130 Ap Cisco catalyst 9130 Cisco catalyst 9124ax Cisco aironet 3800 Cisco catalyst 9115 Ap Cisco catalyst 9105 Cisco catalyst Iw6300 Ac Cisco catalyst Iw6300 Cisco aironet 1815w Cisco aironet 3800i Cisco catalyst 9105axw Cisco aironet 1562d Cisco aironet 1542i Cisco aironet 2800 Cisco catalyst 9115 Cisco catalyst 9120 Ap Cisco catalyst 9115ax Cisco aironet 1562e Cisco catalyst 9124axi Cisco aironet 1800 Cisco aironet 3800p Cisco catalyst 9117 Cisco aironet 2800i Cisco aironet 1815t Cisco aironet 2800e Cisco aironet 1562i Cisco wireless Lan Controller Software Cisco Cisco catalyst Iw6300 Dcw Cisco catalyst 9130ax Cisco aironet 1560 Cisco esw6300 Cisco catalyst 9124axd Cisco catalyst 9117 Ap Cisco catalyst 9115axe Cisco catalyst 9130axi Cisco catalyst 9120axp Cisco catalyst 9117axi Cisco catalyst 9120 Cisco aironet 1815i Cisco aironet 1810w Cisco aironet 1540 Cisco catalyst 9105axi Cisco catalyst 9115axi Cisco catalyst 9100 Cisco aironet 1800i Cisco aironet 3800e Cisco catalyst 9105ax Cisco catalyst Iw6300 Dc Cisco aironet 1815m Cisco catalyst 9124 Cisco catalyst 9130axe Cisco catalyst 9120axe Cisco aironet 1815 Cisco aironet 4800 Cisco aironet 1810 Cisco catalyst 9120ax Cisco catalyst 9120axi Cisco catalyst 9117ax Cisco ios Xe |
|
References | (CISCO) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-cli-dos-tc2EKEpu - Vendor Advisory | |
CPE | cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9117:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1560:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1815t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9100:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1815m:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9124axd:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9117ax:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9130_ap:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1815:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9105:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9124:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9120ax:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1815w:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_iw6300_ac:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9115ax:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_iw6300_dcw:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_4800:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9130ax:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9105axw:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1540:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9117_ap:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9115_ap:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9124axi:-:*:*:*:*:*:*:* cpe:2.3:a:cisco:aironet_access_point_software:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9105ax:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9124ax:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1800:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9120_ap:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_iw6300_dc:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:* |
|
CWE | NVD-CWE-noinfo | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
23 Mar 2023, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-03-23 17:15
Updated : 2024-11-21 07:40
NVD link : CVE-2023-20056
Mitre link : CVE-2023-20056
CVE.ORG link : CVE-2023-20056
JSON object : View
Products Affected
cisco
- catalyst_iw6300_dc
- aironet_3800
- aironet_2800e
- catalyst_9100
- catalyst_9105axw
- catalyst_9124axd
- esw6300
- aironet_access_point_software
- catalyst_9117ax
- catalyst_9120_ap
- aironet_1562i
- catalyst_9120ax
- catalyst_9130axe
- catalyst_9115axe
- aironet_1542d
- aironet_1810
- catalyst_9120axp
- catalyst_9105axi
- catalyst_9115axi
- catalyst_9130axi
- catalyst_9124ax
- aironet_3800e
- catalyst_9115ax
- aironet_2800
- catalyst_9117
- ios_xe
- aironet_1800i
- aironet_1815t
- catalyst_9130_ap
- aironet_1815
- aironet_3800i
- catalyst_9115
- catalyst_9124axi
- catalyst_9105ax
- aironet_1562e
- catalyst_9105
- catalyst_iw6300_ac
- catalyst_9120axi
- catalyst_9124
- wireless_lan_controller_software
- aironet_3800p
- catalyst_9130
- catalyst_iw6300
- aironet_1540
- aironet_1562d
- aironet_1800
- aironet_1560
- aironet_1815w
- catalyst_9120axe
- aironet_1815i
- aironet_1815m
- catalyst_9115_ap
- catalyst_iw6300_dcw
- catalyst_9120
- catalyst_9130ax
- aironet_1542i
- aironet_1810w
- aironet_4800
- catalyst_9117axi
- aironet_2800i
- catalyst_9117_ap
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
NVD-CWE-noinfo