CVE-2023-20176
MEDIUM
Published 2023-09-27T17:25:00.473Z
Actions:
CVSS Score
V3.1
5.8
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2023.03.01
0.001
probability
of exploitation in the wild
There is a 0.1% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-01-25
Exploit Probability
Percentile: 0.470
Higher than 47.0% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service.
This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session to tear down and reset, causing a denial of service (DoS) condition.
Available Exploits
No exploits available for this CVE.
Related News
No news articles found for this CVE.
Affected Products
Affected Versions:
Affected Versions:
16.10.1e
16.10.1
17.1.1t
17.1.1s
17.1.1
16.11.1a
16.11.1
16.11.1c
16.11.1b
16.12.1s
16.12.4
16.12.1
16.12.2s
16.12.1t
16.12.4a
16.12.5
16.12.3
16.12.6
16.12.8
16.12.7
16.12.6a
17.3.1
17.3.2a
17.3.3
17.3.2
17.3.4c
17.3.5a
17.3.6
17.2.1
17.2.1a
17.2.3
17.2.2
17.5.1
17.4.1
17.4.2
17.6.1
17.6.2
17.6.3
17.6.4
17.6.5
17.7.1
17.8.1
Published: 2023-09-27T17:25:00.473Z
Last Modified: 2024-08-02T09:05:34.976Z
Copied to clipboard!