A vulnerability in the DHCP processing functionality of Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to the improper processing of DHCP messages. An attacker could exploit this vulnerability by sending malicious DHCP messages to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-dhcp-dos-76pCjPxK | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
27 Jun 2023, 18:22
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-noinfo |
Information
Published : 2022-09-30 19:15
Updated : 2024-02-28 19:29
NVD link : CVE-2022-20847
Mitre link : CVE-2022-20847
CVE.ORG link : CVE-2022-20847
JSON object : View
Products Affected
cisco
- catalyst_9800-l
- catalyst_9800-40
- catalyst_9800-cl
- catalyst_9800-l-f
- catalyst_9800-l-c
- catalyst_9800-80
- ios_xe
- catalyst_9800
CWE