Summary
Detail | |||
---|---|---|---|
Vendor | Cisco | First view | 2023-09-27 |
Product | Catalyst 9136 Firmware | Last view | 2023-09-27 |
Version | 17.5.1c | Type | Os |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:o:cisco:catalyst_9136_firmware |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
8.6 | 2023-09-27 | CVE-2023-20176 | A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service. This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
100% (1) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |