QID 317373

Date Published: 2023-10-19

QID 317373: Cisco Catalyst 9100 Access Points Denial of Service (DoS) Vulnerability (cisco-sa-click-ap-dos-wdcXkvnQ)

A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service.

Affected Products:
This vulnerability affected the following Cisco products if they were running a vulnerable release of Cisco Catalyst 9800 Wireless Controller Software:
Catalyst 9124 APs
Catalyst 9130 APs
Catalyst 9136 APs
Catalyst 9164 APs
Catalyst 9166 APs

QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.

A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.

  • CVSS V3 rated as Critical - 8.6 severity.
  • CVSS V2 rated as Medium - 5 severity.
  • Solution

    Customers are advised to refer to cisco-sa-click-ap-dos-wdcXkvnQ for more information.

    CVEs related to QID 317373

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-click-ap-dos-wdcXkvnQ URL Logo sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-click-ap-dos-wdcXkvnQ