A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.
This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of network requests to an affected device. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to reload, resulting in a DoS condition.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-wncd-HFGMsfSD | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
25 Jan 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-27 18:15
Updated : 2024-02-05 00:01
NVD link : CVE-2023-20202
Mitre link : CVE-2023-20202
CVE.ORG link : CVE-2023-20202
JSON object : View
Products Affected
cisco
- catalyst_9105i
- catalyst_9800-40
- catalyst_9166d1
- catalyst_9800-cl
- catalyst_9164
- catalyst_9130
- catalyst_9124d
- iw9167eh-x-urwb
- catalyst_9120
- catalyst_9124i
- iw9167eh-x-ap
- catalyst_9166
- catalyst_9162
- catalyst_9136
- iw9167ih-x-ap
- catalyst_9115
- ios_xe
- catalyst_9124e
- catalyst_iw6300
- esw6300
- iw9167eh-x-wgb
- catalyst_9105w
- catalyst_9800-80
- catalyst_9800-l
CWE