Логотип exploitDog
bind:CVE-2023-20176
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-20176

Количество 3

Количество 3

nvd логотип

CVE-2023-20176

больше 2 лет назад

A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service. This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.

CVSS3: 5.8
EPSS: Низкий
github логотип

GHSA-68hh-p8m2-hpx3

больше 2 лет назад

A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service. This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.

CVSS3: 5.8
EPSS: Низкий
fstec логотип

BDU:2023-06361

больше 3 лет назад

Уязвимость компонента networking микропрограммного обеспечения точек доступа Cisco Catalyst 9124, Catalyst 9130, Catalyst 9136, Catalyst 9164 и Catalyst 9166, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-20176

A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service. This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.

CVSS3: 5.8
0%
Низкий
больше 2 лет назад
github логотип
GHSA-68hh-p8m2-hpx3

A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service. This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.

CVSS3: 5.8
0%
Низкий
больше 2 лет назад
fstec логотип
BDU:2023-06361

Уязвимость компонента networking микропрограммного обеспечения точек доступа Cisco Catalyst 9124, Catalyst 9130, Catalyst 9136, Catalyst 9164 и Catalyst 9166, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.8
0%
Низкий
больше 3 лет назад

Уязвимостей на страницу