A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service.
This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2023-09-27T17:25:00.473Z
Updated: 2024-01-25T16:57:49.991Z
Reserved: 2022-10-27T18:47:50.363Z
Link: CVE-2023-20176
JSON object: View
NVD Information
Status : Modified
Published: 2023-09-27T18:15:10.923
Modified: 2024-01-25T17:15:32.443
Link: CVE-2023-20176
JSON object: View
Redhat Information
No data.
CWE