Vulnerabilites related to cisco - business_141acm
Vulnerability from fkie_nvd
Published
2023-05-18 03:15
Modified
2024-11-21 07:40
Summary
A vulnerability in the social login configuration option for the guest users of Cisco Business Wireless Access Points (APs) could allow an unauthenticated, adjacent attacker to bypass social login authentication. This vulnerability is due to a logic error with the social login implementation. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the Guest Portal without authentication.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:business_140ac_access_point_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89879868-DE12-495F-BB7D-BD2F49DC98BC",
              "versionEndExcluding": "10.8.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:business_140ac_access_point:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5781CAA5-2DB2-4724-A08E-D74A7DBBDB75",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:business_141acm_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E769285-4B44-4089-AA79-13C96A4D482C",
              "versionEndExcluding": "10.8.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:business_141acm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A730910D-5C14-477A-BB73-B28B87CCC48D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:business_142acm_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1579F8FF-E664-4AF8-8BF3-1688CDF1F1BD",
              "versionEndExcluding": "10.8.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:business_142acm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2DC1D86-30FB-46D3-93B3-452E3A4871E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:business_143acm_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D900D1C-408E-43BE-908B-D1DA57C36728",
              "versionEndExcluding": "10.8.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:business_143acm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9EFC167-CC69-4777-9039-2DCF61C8101A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:business_151axm_firmware:10.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDBAE3F9-3874-44D4-9FCB-C581C0C194D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:business_151axm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8760865B-4AB3-4A1A-960D-FF6974A7AC06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:business_145ac_access_point_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0836638-DD84-4797-9DBC-66C8CE508308",
              "versionEndExcluding": "10.8.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:business_145ac_access_point:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1FC172-7E73-475E-8E16-3FDC12FB5FC7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:business_150ax_access_point_firmware:10.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F92F4E0E-C063-4157-8E63-6C1895FA82BD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:business_150ax_access_point:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE3E5E5-BC8D-42A5-89C5-6FEC0E581E7C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:business_240ac_access_point_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFE6116E-42BD-462D-B436-1E3E10947D83",
              "versionEndExcluding": "10.8.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:business_240ac_access_point:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4864663A-ADFD-4C19-84E2-F3B54F2813F3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the social login configuration option for the guest users of Cisco Business Wireless Access Points (APs) could allow an unauthenticated, adjacent attacker to bypass social login authentication. This vulnerability is due to a logic error with the social login implementation. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the Guest Portal without authentication."
    }
  ],
  "id": "CVE-2023-20003",
  "lastModified": "2024-11-21T07:40:19.190",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-18T03:15:09.477",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbw-auth-bypass-ggnAfdZ"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbw-auth-bypass-ggnAfdZ"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-288"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-306"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-03-27 17:15
Modified
2025-08-06 13:45
Summary
A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9569A47F-9B78-4087-8ADB-3FD1A20F4B92",
              "versionEndExcluding": "17.3.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4795FF5-9A0B-4D01-A4FA-895AE4F15F55",
              "versionEndExcluding": "17.6.6",
              "versionStartIncluding": "17.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24ECD9F5-7C7A-48B7-9BE1-7CE458B7D6A1",
              "versionEndExcluding": "17.9.5",
              "versionStartIncluding": "17.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD6F93FF-B86A-45F8-9671-6A7037F85276",
              "versionEndExcluding": "17.12.2",
              "versionStartIncluding": "17.10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:business_access_points:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66046F3F-D6DC-4DB0-B195-013E7DB3DD30",
              "versionEndExcluding": "10.9.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:business_140ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6331ADD0-9438-4095-84D4-4434C4782C60",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:business_140ac_access_point:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5781CAA5-2DB2-4724-A08E-D74A7DBBDB75",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:business_141acm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A730910D-5C14-477A-BB73-B28B87CCC48D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:business_142acm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2DC1D86-30FB-46D3-93B3-452E3A4871E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:business_143acm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9EFC167-CC69-4777-9039-2DCF61C8101A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:business_145ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "19202724-5BEB-487C-98EA-F3B6924C52CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:business_145ac_access_point:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1FC172-7E73-475E-8E16-3FDC12FB5FC7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:business_240ac:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07135C18-DDB4-41F3-971F-A4FC38C99E26",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:business_access_points:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24A08E76-11E3-4ADC-8B87-1DCF419A295A",
              "versionEndExcluding": "10.6.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:business_150ax:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB2B555E-1523-4C62-A91D-EE1F3F1200EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:business_150ax_access_point:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE3E5E5-BC8D-42A5-89C5-6FEC0E581E7C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:cisco:business_151axm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8760865B-4AB3-4A1A-960D-FF6974A7AC06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A084C31F-54F0-444E-A2F0-817F1C8B3BFE",
              "versionEndExcluding": "8.10.190.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el procesamiento de paquetes IP del software Cisco Access Point (AP) podr\u00eda permitir que un atacante remoto no autenticado cause una condici\u00f3n de denegaci\u00f3n de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a una validaci\u00f3n de entrada insuficiente de ciertos paquetes IPv4. Un atacante podr\u00eda aprovechar esta vulnerabilidad enviando un paquete IPv4 manipulado hacia o a trav\u00e9s de un dispositivo afectado. Un exploit exitoso podr\u00eda permitir al atacante hacer que un dispositivo afectado se recargue inesperadamente, lo que resultar\u00eda en una condici\u00f3n DoS. Para explotar con \u00e9xito esta vulnerabilidad, no es necesario que el atacante est\u00e9 asociado con el AP afectado. Esta vulnerabilidad no se puede aprovechar enviando paquetes IPv6."
    }
  ],
  "id": "CVE-2024-20271",
  "lastModified": "2025-08-06T13:45:24.563",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-03-27T17:15:51.320",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2023-20003 (GCVE-0-2023-20003)
Vulnerability from cvelistv5
Published
2023-05-18 00:00
Modified
2024-10-25 15:58
CWE
Summary
A vulnerability in the social login configuration option for the guest users of Cisco Business Wireless Access Points (APs) could allow an unauthenticated, adjacent attacker to bypass social login authentication. This vulnerability is due to a logic error with the social login implementation. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the Guest Portal without authentication.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:57:35.019Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20230517 Cisco Business Wireless Access Points Social Login Guest User Authentication Bypass Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbw-auth-bypass-ggnAfdZ"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20003",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-25T14:34:30.280035Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-25T15:58:19.897Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Business Wireless Access Point Software ",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2023-05-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the social login configuration option for the guest users of Cisco Business Wireless Access Points (APs) could allow an unauthenticated, adjacent attacker to bypass social login authentication. This vulnerability is due to a logic error with the social login implementation. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the Guest Portal without authentication."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-288",
              "description": "CWE-288",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-18T00:00:00",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20230517 Cisco Business Wireless Access Points Social Login Guest User Authentication Bypass Vulnerability",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbw-auth-bypass-ggnAfdZ"
        }
      ],
      "source": {
        "advisory": "cisco-sa-cbw-auth-bypass-ggnAfdZ",
        "defect": [
          [
            "CSCwd07949"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Business Wireless Access Points Social Login Guest User Authentication Bypass Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2023-20003",
    "datePublished": "2023-05-18T00:00:00",
    "dateReserved": "2022-10-27T00:00:00",
    "dateUpdated": "2024-10-25T15:58:19.897Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-20271 (GCVE-0-2024-20271)
Vulnerability from cvelistv5
Published
2024-03-27 17:05
Modified
2024-08-01 21:52
CWE
  • CWE-20 - Improper Input Validation
Summary
A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets.
Impacted products
Vendor Product Version
Cisco Cisco Aironet Access Point Software Version: 8.2.100.0
Version: 8.2.130.0
Version: 8.2.111.0
Version: 8.2.110.0
Version: 8.2.121.0
Version: 8.2.141.0
Version: 8.2.151.0
Version: 8.2.160.0
Version: 8.2.161.0
Version: 8.2.164.0
Version: 8.2.166.0
Version: 8.2.170.0
Version: 8.2.163.0
Version: 8.3.102.0
Version: 8.3.111.0
Version: 8.3.112.0
Version: 8.3.121.0
Version: 8.3.122.0
Version: 8.3.130.0
Version: 8.3.131.0
Version: 8.3.132.0
Version: 8.3.133.0
Version: 8.3.140.0
Version: 8.3.141.0
Version: 8.3.143.0
Version: 8.3.150.0
Version: 8.3.108.0
Version: 8.3.90.53
Version: 8.3.104.46
Version: 8.3.200.200
Version: 8.3.104.64
Version: 8.3.15.165
Version: 8.3.90.11
Version: 8.3.135.0
Version: 8.3.104.14
Version: 8.3.90.36
Version: 8.3.15.142
Version: 8.3.104.37
Version: 8.3.15.117
Version: 8.3.15.120
Version: 8.3.15.25
Version: 8.3.15.158
Version: 8.3.15.118
Version: 8.3.90.25
Version: 8.3.15.169
Version: 8.3.90.58
Version: 8.4.100.0
Version: 8.4.1.199
Version: 8.4.1.91
Version: 8.4.1.142
Version: 8.4.1.175
Version: 8.4.1.218
Version: 8.4.1.92
Version: 8.5.103.0
Version: 8.5.105.0
Version: 8.5.110.0
Version: 8.5.120.0
Version: 8.5.131.0
Version: 8.5.140.0
Version: 8.5.135.0
Version: 8.5.151.0
Version: 8.5.101.0
Version: 8.5.102.0
Version: 8.5.161.0
Version: 8.5.160.0
Version: 8.5.100.0
Version: 8.5.171.0
Version: 8.5.164.0
Version: 8.5.182.0
Version: 8.5.182.11 ME
Version: 8.7.102.0
Version: 8.7.106.0
Version: 8.7.1.16
Version: 8.8.100.0
Version: 8.8.111.0
Version: 8.8.120.0
Version: 8.8.125.0
Version: 8.8.130.0
Version: 8.6.101.0
Version: 8.6.1.84
Version: 8.6.1.70
Version: 8.6.1.71
Version: 8.9.100.0
Version: 8.9.111.0
Version: 8.10.105.0
Version: 8.10.111.0
Version: 8.10.130.0
Version: 8.10.112.0
Version: 8.10.122.0
Version: 8.10.113.0
Version: 8.10.121.0
Version: 8.10.141.0
Version: 8.10.142.0
Version: 8.10.151.0
Version: 8.10.150.0
Version: 8.10.171.0
Version: 8.10.181.0
Version: 8.10.182.0
Version: 8.10.161.0
Version: 8.10.170.0
Version: 8.10.183.0
Version: 8.10.162.0
Version: 8.10.185.0
Create a notification for this product.
   Cisco Cisco Business Wireless Access Point Software Version: 10.0.1.0
Version: 10.0.2.0
Version: 10.1.1.0
Version: 10.1.2.0
Version: 10.2.1.0
Version: 10.2.2.0
Version: 10.3.1.0
Version: 10.3.1.1
Version: 10.3.2.0
Version: 1.0.0.13
Version: 1.0.0.16
Version: 1.0.0.3
Version: 1.0.0.39
Version: 1.0.0.4
Version: 1.0.0.5
Version: 1.0.0.7
Version: 1.0.1.2
Version: 1.0.1.3
Version: 1.0.1.4
Version: 1.0.1.5
Version: 1.0.1.6
Version: 1.0.1.7
Version: 1.0.2.0
Version: 1.0.2.13
Version: 1.0.2.14
Version: 1.0.2.15
Version: 1.0.2.16
Version: 1.0.2.17
Version: 1.0.2.2
Version: 1.0.2.8
Version: 1.0.3.1
Version: 1.0.4.4
Version: 1.0.4.3
Version: 1.0.6.6
Version: 1.0.3.4
Version: 1.0.6.8
Version: 1.0.6.2
Version: 1.0.2.3
Version: 1.0.5.3
Version: 1.0.1.10
Version: 1.0.4.2
Version: 1.0.6.5
Version: 1.0.6.7
Version: 1.0.5.0
Version: 1.0.0.10
Version: 1.0.0.12
Version: 1.0.0.14
Version: 1.0.0.15
Version: 1.0.0.17
Version: 1.0.0.9
Version: 1.0.1.11
Version: 1.0.1.12
Version: 1.0.1.9
Version: 1.0.2.6
Version: 1.1.0.5
Version: 1.1.0.7
Version: 1.1.0.9
Version: 1.1.1.0
Version: 1.1.2.4
Version: 1.1.4.6
Version: 1.1.3.2
Version: 1.1.4.0
Version: 1.1.0.3
Version: 1.1.0.4
Version: 1.1.0.6
Version: 1.1.2.3
Version: 10.4.1.0
Version: 10.4.2.0
Version: 10.6.1.0
Version: 10.7.1.0
Version: 10.8.1.0
Version: 1.2.0.2
Version: 1.2.0.3
Version: 1.2.1.3
Version: 1.3.0.3
Version: 1.3.0.4
Version: 1.3.0.6
Version: 1.3.0.7
Version: 10.5.2.0
Create a notification for this product.
   Cisco Cisco Aironet Access Point Software (IOS XE Controller) Version: 16.10.1e
Version: 16.10.1
Version: 17.1.1t
Version: 17.1.1s
Version: 17.1.1
Version: 16.11.1a
Version: 16.11.1
Version: 16.11.1c
Version: 16.11.1b
Version: 16.12.1s
Version: 16.12.4
Version: 16.12.1
Version: 16.12.2s
Version: 16.12.1t
Version: 16.12.4a
Version: 16.12.5
Version: 16.12.3
Version: 16.12.6
Version: 16.12.8
Version: 16.12.7
Version: 16.12.6a
Version: 17.3.1
Version: 17.3.2a
Version: 17.3.3
Version: 17.3.4
Version: 17.3.5
Version: 17.3.2
Version: 17.3.4c
Version: 17.3.5a
Version: 17.3.5b
Version: 17.3.6
Version: 17.2.1
Version: 17.2.1a
Version: 17.2.3
Version: 17.2.2
Version: 17.5.1
Version: 17.4.1
Version: 17.4.2
Version: 17.6.1
Version: 17.6.2
Version: 17.6.3
Version: 17.6.4
Version: 17.6.5
Version: 17.10.1
Version: 17.9.1
Version: 17.9.2
Version: 17.9.3
Version: 17.9.4
Version: 17.9.4a
Version: 17.7.1
Version: 17.8.1
Version: 17.11.1
Version: 17.12.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.111.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.112.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.113.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.121.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.122.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.130.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.141.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.142.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.150.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.151.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.161.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.162.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.170.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.171.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.181.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.182.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.183.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.10.185.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.2\\(100.0\\):*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.2.110.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.2.111.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.2.121.0:*:*:*:*:*:*:*",
              "cpe:2.3:o:cisco:aironet_access_point_software:8.2\\(130.0\\):*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.2.141.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.2.151.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.2.160.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.2.161.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.2.163.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.2.164.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.2.166.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.2.170.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.102.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.104.14:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.104.37:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.104.46:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.104.64:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.108.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.111.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.112.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.121.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.122.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.130.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.131.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.132.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.133.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.135.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.140.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.141.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.143.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.150.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.117:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.118:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.120:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.142:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.158:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.165:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.169:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.15.25:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.200.200:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.90.11:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.90.25:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.90.36:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.90.53:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.3.90.58:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.4.100.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.4.1.142:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.4.1.175:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.4.1.199:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.4.1.218:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.4.1.91:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.4.1.92:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.100.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.101.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.102.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.103.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.105.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.110.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.120.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.131.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.135.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.140.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.151.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.160.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.161.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.164.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.171.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.5.182.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.6.101.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.6.1.70:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.6.1.71:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.6.1.84:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.7.102.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.7.106.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.7.1.16:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.8.100.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.8.111.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.8.120.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.8.125.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.8.130.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.9.100.0:*:*:*:*:*:*:*",
              "cpe:2.3:a:cisco:aironet_access_point_software:8.9.111.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "aironet_access_point_software",
            "vendor": "cisco",
            "versions": [
              {
                "status": "affected",
                "version": "8.10.111.0"
              },
              {
                "status": "affected",
                "version": "8.10.112.0"
              },
              {
                "status": "affected",
                "version": "8.10.113.0"
              },
              {
                "status": "affected",
                "version": "8.10.121.0"
              },
              {
                "status": "affected",
                "version": "8.10.122.0"
              },
              {
                "status": "affected",
                "version": "8.10.130.0"
              },
              {
                "status": "affected",
                "version": "8.10.141.0"
              },
              {
                "status": "affected",
                "version": "8.10.142.0"
              },
              {
                "status": "affected",
                "version": "8.10.150.0"
              },
              {
                "status": "affected",
                "version": "8.10.151.0"
              },
              {
                "status": "affected",
                "version": "8.10.161.0"
              },
              {
                "status": "affected",
                "version": "8.10.162.0"
              },
              {
                "status": "affected",
                "version": "8.10.170.0"
              },
              {
                "status": "affected",
                "version": "8.10.171.0"
              },
              {
                "status": "affected",
                "version": "8.10.181.0"
              },
              {
                "status": "affected",
                "version": "8.10.182.0"
              },
              {
                "status": "affected",
                "version": "8.10.183.0"
              },
              {
                "status": "affected",
                "version": "8.10.185.0"
              },
              {
                "status": "affected",
                "version": "8.2\\(100.0\\)"
              },
              {
                "status": "affected",
                "version": "8.2.110.0"
              },
              {
                "status": "affected",
                "version": "8.2.111.0"
              },
              {
                "status": "affected",
                "version": "8.2.121.0"
              },
              {
                "status": "affected",
                "version": "8.2\\(130.0\\)"
              },
              {
                "status": "affected",
                "version": "8.2.141.0"
              },
              {
                "status": "affected",
                "version": "8.2.151.0"
              },
              {
                "status": "affected",
                "version": "8.2.160.0"
              },
              {
                "status": "affected",
                "version": "8.2.161.0"
              },
              {
                "status": "affected",
                "version": "8.2.163.0"
              },
              {
                "status": "affected",
                "version": "8.2.164.0"
              },
              {
                "status": "affected",
                "version": "8.2.166.0"
              },
              {
                "status": "affected",
                "version": "8.2.170.0"
              },
              {
                "status": "affected",
                "version": "8.3.102.0"
              },
              {
                "status": "affected",
                "version": "8.3.104.14"
              },
              {
                "status": "affected",
                "version": "8.3.104.37"
              },
              {
                "status": "affected",
                "version": "8.3.104.46"
              },
              {
                "status": "affected",
                "version": "8.3.104.64"
              },
              {
                "status": "affected",
                "version": "8.3.108.0"
              },
              {
                "status": "affected",
                "version": "8.3.111.0"
              },
              {
                "status": "affected",
                "version": "8.3.112.0"
              },
              {
                "status": "affected",
                "version": "8.3.121.0"
              },
              {
                "status": "affected",
                "version": "8.3.122.0"
              },
              {
                "status": "affected",
                "version": "8.3.130.0"
              },
              {
                "status": "affected",
                "version": "8.3.131.0"
              },
              {
                "status": "affected",
                "version": "8.3.132.0"
              },
              {
                "status": "affected",
                "version": "8.3.133.0"
              },
              {
                "status": "affected",
                "version": "8.3.135.0"
              },
              {
                "status": "affected",
                "version": "8.3.140.0"
              },
              {
                "status": "affected",
                "version": "8.3.141.0"
              },
              {
                "status": "affected",
                "version": "8.3.143.0"
              },
              {
                "status": "affected",
                "version": "8.3.150.0"
              },
              {
                "status": "affected",
                "version": "8.3.15.117"
              },
              {
                "status": "affected",
                "version": "8.3.15.118"
              },
              {
                "status": "affected",
                "version": "8.3.15.120"
              },
              {
                "status": "affected",
                "version": "8.3.15.142"
              },
              {
                "status": "affected",
                "version": "8.3.15.158"
              },
              {
                "status": "affected",
                "version": "8.3.15.165"
              },
              {
                "status": "affected",
                "version": "8.3.15.169"
              },
              {
                "status": "affected",
                "version": "8.3.15.25"
              },
              {
                "status": "affected",
                "version": "8.3.200.200"
              },
              {
                "status": "affected",
                "version": "8.3.90.11"
              },
              {
                "status": "affected",
                "version": "8.3.90.25"
              },
              {
                "status": "affected",
                "version": "8.3.90.36"
              },
              {
                "status": "affected",
                "version": "8.3.90.53"
              },
              {
                "status": "affected",
                "version": "8.3.90.58"
              },
              {
                "status": "affected",
                "version": "8.4.100.0"
              },
              {
                "status": "affected",
                "version": "8.4.1.142"
              },
              {
                "status": "affected",
                "version": "8.4.1.175"
              },
              {
                "status": "affected",
                "version": "8.4.1.199"
              },
              {
                "status": "affected",
                "version": "8.4.1.218"
              },
              {
                "status": "affected",
                "version": "8.4.1.91"
              },
              {
                "status": "affected",
                "version": "8.4.1.92"
              },
              {
                "status": "affected",
                "version": "8.5.100.0"
              },
              {
                "status": "affected",
                "version": "8.5.101.0"
              },
              {
                "status": "affected",
                "version": "8.5.102.0"
              },
              {
                "status": "affected",
                "version": "8.5.103.0"
              },
              {
                "status": "affected",
                "version": "8.5.105.0"
              },
              {
                "status": "affected",
                "version": "8.5.110.0"
              },
              {
                "status": "affected",
                "version": "8.5.120.0"
              },
              {
                "status": "affected",
                "version": "8.5.131.0"
              },
              {
                "status": "affected",
                "version": "8.5.135.0"
              },
              {
                "status": "affected",
                "version": "8.5.140.0"
              },
              {
                "status": "affected",
                "version": "8.5.151.0"
              },
              {
                "status": "affected",
                "version": "8.5.160.0"
              },
              {
                "status": "affected",
                "version": "8.5.161.0"
              },
              {
                "status": "affected",
                "version": "8.5.164.0"
              },
              {
                "status": "affected",
                "version": "8.5.171.0"
              },
              {
                "status": "affected",
                "version": "8.5.182.0"
              },
              {
                "status": "affected",
                "version": "8.6.101.0"
              },
              {
                "status": "affected",
                "version": "8.6.1.70"
              },
              {
                "status": "affected",
                "version": "8.6.1.71"
              },
              {
                "status": "affected",
                "version": "8.6.1.84"
              },
              {
                "status": "affected",
                "version": "8.7.102.0"
              },
              {
                "status": "affected",
                "version": "8.7.106.0"
              },
              {
                "status": "affected",
                "version": "8.7.1.16"
              },
              {
                "status": "affected",
                "version": "8.8.100.0"
              },
              {
                "status": "affected",
                "version": "8.8.111.0"
              },
              {
                "status": "affected",
                "version": "8.8.120.0"
              },
              {
                "status": "affected",
                "version": "8.8.125.0"
              },
              {
                "status": "affected",
                "version": "8.8.130.0"
              },
              {
                "status": "affected",
                "version": "8.9.100.0"
              },
              {
                "status": "affected",
                "version": "8.9.111.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-20271",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-28T16:39:13.630340Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-28T13:07:00.717Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:52:38.878Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "cisco-sa-ap-dos-h9TGGX6W",
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Aironet Access Point Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "8.2.100.0"
            },
            {
              "status": "affected",
              "version": "8.2.130.0"
            },
            {
              "status": "affected",
              "version": "8.2.111.0"
            },
            {
              "status": "affected",
              "version": "8.2.110.0"
            },
            {
              "status": "affected",
              "version": "8.2.121.0"
            },
            {
              "status": "affected",
              "version": "8.2.141.0"
            },
            {
              "status": "affected",
              "version": "8.2.151.0"
            },
            {
              "status": "affected",
              "version": "8.2.160.0"
            },
            {
              "status": "affected",
              "version": "8.2.161.0"
            },
            {
              "status": "affected",
              "version": "8.2.164.0"
            },
            {
              "status": "affected",
              "version": "8.2.166.0"
            },
            {
              "status": "affected",
              "version": "8.2.170.0"
            },
            {
              "status": "affected",
              "version": "8.2.163.0"
            },
            {
              "status": "affected",
              "version": "8.3.102.0"
            },
            {
              "status": "affected",
              "version": "8.3.111.0"
            },
            {
              "status": "affected",
              "version": "8.3.112.0"
            },
            {
              "status": "affected",
              "version": "8.3.121.0"
            },
            {
              "status": "affected",
              "version": "8.3.122.0"
            },
            {
              "status": "affected",
              "version": "8.3.130.0"
            },
            {
              "status": "affected",
              "version": "8.3.131.0"
            },
            {
              "status": "affected",
              "version": "8.3.132.0"
            },
            {
              "status": "affected",
              "version": "8.3.133.0"
            },
            {
              "status": "affected",
              "version": "8.3.140.0"
            },
            {
              "status": "affected",
              "version": "8.3.141.0"
            },
            {
              "status": "affected",
              "version": "8.3.143.0"
            },
            {
              "status": "affected",
              "version": "8.3.150.0"
            },
            {
              "status": "affected",
              "version": "8.3.108.0"
            },
            {
              "status": "affected",
              "version": "8.3.90.53"
            },
            {
              "status": "affected",
              "version": "8.3.104.46"
            },
            {
              "status": "affected",
              "version": "8.3.200.200"
            },
            {
              "status": "affected",
              "version": "8.3.104.64"
            },
            {
              "status": "affected",
              "version": "8.3.15.165"
            },
            {
              "status": "affected",
              "version": "8.3.90.11"
            },
            {
              "status": "affected",
              "version": "8.3.135.0"
            },
            {
              "status": "affected",
              "version": "8.3.104.14"
            },
            {
              "status": "affected",
              "version": "8.3.90.36"
            },
            {
              "status": "affected",
              "version": "8.3.15.142"
            },
            {
              "status": "affected",
              "version": "8.3.104.37"
            },
            {
              "status": "affected",
              "version": "8.3.15.117"
            },
            {
              "status": "affected",
              "version": "8.3.15.120"
            },
            {
              "status": "affected",
              "version": "8.3.15.25"
            },
            {
              "status": "affected",
              "version": "8.3.15.158"
            },
            {
              "status": "affected",
              "version": "8.3.15.118"
            },
            {
              "status": "affected",
              "version": "8.3.90.25"
            },
            {
              "status": "affected",
              "version": "8.3.15.169"
            },
            {
              "status": "affected",
              "version": "8.3.90.58"
            },
            {
              "status": "affected",
              "version": "8.4.100.0"
            },
            {
              "status": "affected",
              "version": "8.4.1.199"
            },
            {
              "status": "affected",
              "version": "8.4.1.91"
            },
            {
              "status": "affected",
              "version": "8.4.1.142"
            },
            {
              "status": "affected",
              "version": "8.4.1.175"
            },
            {
              "status": "affected",
              "version": "8.4.1.218"
            },
            {
              "status": "affected",
              "version": "8.4.1.92"
            },
            {
              "status": "affected",
              "version": "8.5.103.0"
            },
            {
              "status": "affected",
              "version": "8.5.105.0"
            },
            {
              "status": "affected",
              "version": "8.5.110.0"
            },
            {
              "status": "affected",
              "version": "8.5.120.0"
            },
            {
              "status": "affected",
              "version": "8.5.131.0"
            },
            {
              "status": "affected",
              "version": "8.5.140.0"
            },
            {
              "status": "affected",
              "version": "8.5.135.0"
            },
            {
              "status": "affected",
              "version": "8.5.151.0"
            },
            {
              "status": "affected",
              "version": "8.5.101.0"
            },
            {
              "status": "affected",
              "version": "8.5.102.0"
            },
            {
              "status": "affected",
              "version": "8.5.161.0"
            },
            {
              "status": "affected",
              "version": "8.5.160.0"
            },
            {
              "status": "affected",
              "version": "8.5.100.0"
            },
            {
              "status": "affected",
              "version": "8.5.171.0"
            },
            {
              "status": "affected",
              "version": "8.5.164.0"
            },
            {
              "status": "affected",
              "version": "8.5.182.0"
            },
            {
              "status": "affected",
              "version": "8.5.182.11 ME"
            },
            {
              "status": "affected",
              "version": "8.7.102.0"
            },
            {
              "status": "affected",
              "version": "8.7.106.0"
            },
            {
              "status": "affected",
              "version": "8.7.1.16"
            },
            {
              "status": "affected",
              "version": "8.8.100.0"
            },
            {
              "status": "affected",
              "version": "8.8.111.0"
            },
            {
              "status": "affected",
              "version": "8.8.120.0"
            },
            {
              "status": "affected",
              "version": "8.8.125.0"
            },
            {
              "status": "affected",
              "version": "8.8.130.0"
            },
            {
              "status": "affected",
              "version": "8.6.101.0"
            },
            {
              "status": "affected",
              "version": "8.6.1.84"
            },
            {
              "status": "affected",
              "version": "8.6.1.70"
            },
            {
              "status": "affected",
              "version": "8.6.1.71"
            },
            {
              "status": "affected",
              "version": "8.9.100.0"
            },
            {
              "status": "affected",
              "version": "8.9.111.0"
            },
            {
              "status": "affected",
              "version": "8.10.105.0"
            },
            {
              "status": "affected",
              "version": "8.10.111.0"
            },
            {
              "status": "affected",
              "version": "8.10.130.0"
            },
            {
              "status": "affected",
              "version": "8.10.112.0"
            },
            {
              "status": "affected",
              "version": "8.10.122.0"
            },
            {
              "status": "affected",
              "version": "8.10.113.0"
            },
            {
              "status": "affected",
              "version": "8.10.121.0"
            },
            {
              "status": "affected",
              "version": "8.10.141.0"
            },
            {
              "status": "affected",
              "version": "8.10.142.0"
            },
            {
              "status": "affected",
              "version": "8.10.151.0"
            },
            {
              "status": "affected",
              "version": "8.10.150.0"
            },
            {
              "status": "affected",
              "version": "8.10.171.0"
            },
            {
              "status": "affected",
              "version": "8.10.181.0"
            },
            {
              "status": "affected",
              "version": "8.10.182.0"
            },
            {
              "status": "affected",
              "version": "8.10.161.0"
            },
            {
              "status": "affected",
              "version": "8.10.170.0"
            },
            {
              "status": "affected",
              "version": "8.10.183.0"
            },
            {
              "status": "affected",
              "version": "8.10.162.0"
            },
            {
              "status": "affected",
              "version": "8.10.185.0"
            }
          ]
        },
        {
          "product": "Cisco Business Wireless Access Point Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "10.0.1.0"
            },
            {
              "status": "affected",
              "version": "10.0.2.0"
            },
            {
              "status": "affected",
              "version": "10.1.1.0"
            },
            {
              "status": "affected",
              "version": "10.1.2.0"
            },
            {
              "status": "affected",
              "version": "10.2.1.0"
            },
            {
              "status": "affected",
              "version": "10.2.2.0"
            },
            {
              "status": "affected",
              "version": "10.3.1.0"
            },
            {
              "status": "affected",
              "version": "10.3.1.1"
            },
            {
              "status": "affected",
              "version": "10.3.2.0"
            },
            {
              "status": "affected",
              "version": "1.0.0.13"
            },
            {
              "status": "affected",
              "version": "1.0.0.16"
            },
            {
              "status": "affected",
              "version": "1.0.0.3"
            },
            {
              "status": "affected",
              "version": "1.0.0.39"
            },
            {
              "status": "affected",
              "version": "1.0.0.4"
            },
            {
              "status": "affected",
              "version": "1.0.0.5"
            },
            {
              "status": "affected",
              "version": "1.0.0.7"
            },
            {
              "status": "affected",
              "version": "1.0.1.2"
            },
            {
              "status": "affected",
              "version": "1.0.1.3"
            },
            {
              "status": "affected",
              "version": "1.0.1.4"
            },
            {
              "status": "affected",
              "version": "1.0.1.5"
            },
            {
              "status": "affected",
              "version": "1.0.1.6"
            },
            {
              "status": "affected",
              "version": "1.0.1.7"
            },
            {
              "status": "affected",
              "version": "1.0.2.0"
            },
            {
              "status": "affected",
              "version": "1.0.2.13"
            },
            {
              "status": "affected",
              "version": "1.0.2.14"
            },
            {
              "status": "affected",
              "version": "1.0.2.15"
            },
            {
              "status": "affected",
              "version": "1.0.2.16"
            },
            {
              "status": "affected",
              "version": "1.0.2.17"
            },
            {
              "status": "affected",
              "version": "1.0.2.2"
            },
            {
              "status": "affected",
              "version": "1.0.2.8"
            },
            {
              "status": "affected",
              "version": "1.0.3.1"
            },
            {
              "status": "affected",
              "version": "1.0.4.4"
            },
            {
              "status": "affected",
              "version": "1.0.4.3"
            },
            {
              "status": "affected",
              "version": "1.0.6.6"
            },
            {
              "status": "affected",
              "version": "1.0.3.4"
            },
            {
              "status": "affected",
              "version": "1.0.6.8"
            },
            {
              "status": "affected",
              "version": "1.0.6.2"
            },
            {
              "status": "affected",
              "version": "1.0.2.3"
            },
            {
              "status": "affected",
              "version": "1.0.5.3"
            },
            {
              "status": "affected",
              "version": "1.0.1.10"
            },
            {
              "status": "affected",
              "version": "1.0.4.2"
            },
            {
              "status": "affected",
              "version": "1.0.6.5"
            },
            {
              "status": "affected",
              "version": "1.0.6.7"
            },
            {
              "status": "affected",
              "version": "1.0.5.0"
            },
            {
              "status": "affected",
              "version": "1.0.0.10"
            },
            {
              "status": "affected",
              "version": "1.0.0.12"
            },
            {
              "status": "affected",
              "version": "1.0.0.14"
            },
            {
              "status": "affected",
              "version": "1.0.0.15"
            },
            {
              "status": "affected",
              "version": "1.0.0.17"
            },
            {
              "status": "affected",
              "version": "1.0.0.9"
            },
            {
              "status": "affected",
              "version": "1.0.1.11"
            },
            {
              "status": "affected",
              "version": "1.0.1.12"
            },
            {
              "status": "affected",
              "version": "1.0.1.9"
            },
            {
              "status": "affected",
              "version": "1.0.2.6"
            },
            {
              "status": "affected",
              "version": "1.1.0.5"
            },
            {
              "status": "affected",
              "version": "1.1.0.7"
            },
            {
              "status": "affected",
              "version": "1.1.0.9"
            },
            {
              "status": "affected",
              "version": "1.1.1.0"
            },
            {
              "status": "affected",
              "version": "1.1.2.4"
            },
            {
              "status": "affected",
              "version": "1.1.4.6"
            },
            {
              "status": "affected",
              "version": "1.1.3.2"
            },
            {
              "status": "affected",
              "version": "1.1.4.0"
            },
            {
              "status": "affected",
              "version": "1.1.0.3"
            },
            {
              "status": "affected",
              "version": "1.1.0.4"
            },
            {
              "status": "affected",
              "version": "1.1.0.6"
            },
            {
              "status": "affected",
              "version": "1.1.2.3"
            },
            {
              "status": "affected",
              "version": "10.4.1.0"
            },
            {
              "status": "affected",
              "version": "10.4.2.0"
            },
            {
              "status": "affected",
              "version": "10.6.1.0"
            },
            {
              "status": "affected",
              "version": "10.7.1.0"
            },
            {
              "status": "affected",
              "version": "10.8.1.0"
            },
            {
              "status": "affected",
              "version": "1.2.0.2"
            },
            {
              "status": "affected",
              "version": "1.2.0.3"
            },
            {
              "status": "affected",
              "version": "1.2.1.3"
            },
            {
              "status": "affected",
              "version": "1.3.0.3"
            },
            {
              "status": "affected",
              "version": "1.3.0.4"
            },
            {
              "status": "affected",
              "version": "1.3.0.6"
            },
            {
              "status": "affected",
              "version": "1.3.0.7"
            },
            {
              "status": "affected",
              "version": "10.5.2.0"
            }
          ]
        },
        {
          "product": "Cisco Aironet Access Point Software (IOS XE Controller)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "16.10.1e"
            },
            {
              "status": "affected",
              "version": "16.10.1"
            },
            {
              "status": "affected",
              "version": "17.1.1t"
            },
            {
              "status": "affected",
              "version": "17.1.1s"
            },
            {
              "status": "affected",
              "version": "17.1.1"
            },
            {
              "status": "affected",
              "version": "16.11.1a"
            },
            {
              "status": "affected",
              "version": "16.11.1"
            },
            {
              "status": "affected",
              "version": "16.11.1c"
            },
            {
              "status": "affected",
              "version": "16.11.1b"
            },
            {
              "status": "affected",
              "version": "16.12.1s"
            },
            {
              "status": "affected",
              "version": "16.12.4"
            },
            {
              "status": "affected",
              "version": "16.12.1"
            },
            {
              "status": "affected",
              "version": "16.12.2s"
            },
            {
              "status": "affected",
              "version": "16.12.1t"
            },
            {
              "status": "affected",
              "version": "16.12.4a"
            },
            {
              "status": "affected",
              "version": "16.12.5"
            },
            {
              "status": "affected",
              "version": "16.12.3"
            },
            {
              "status": "affected",
              "version": "16.12.6"
            },
            {
              "status": "affected",
              "version": "16.12.8"
            },
            {
              "status": "affected",
              "version": "16.12.7"
            },
            {
              "status": "affected",
              "version": "16.12.6a"
            },
            {
              "status": "affected",
              "version": "17.3.1"
            },
            {
              "status": "affected",
              "version": "17.3.2a"
            },
            {
              "status": "affected",
              "version": "17.3.3"
            },
            {
              "status": "affected",
              "version": "17.3.4"
            },
            {
              "status": "affected",
              "version": "17.3.5"
            },
            {
              "status": "affected",
              "version": "17.3.2"
            },
            {
              "status": "affected",
              "version": "17.3.4c"
            },
            {
              "status": "affected",
              "version": "17.3.5a"
            },
            {
              "status": "affected",
              "version": "17.3.5b"
            },
            {
              "status": "affected",
              "version": "17.3.6"
            },
            {
              "status": "affected",
              "version": "17.2.1"
            },
            {
              "status": "affected",
              "version": "17.2.1a"
            },
            {
              "status": "affected",
              "version": "17.2.3"
            },
            {
              "status": "affected",
              "version": "17.2.2"
            },
            {
              "status": "affected",
              "version": "17.5.1"
            },
            {
              "status": "affected",
              "version": "17.4.1"
            },
            {
              "status": "affected",
              "version": "17.4.2"
            },
            {
              "status": "affected",
              "version": "17.6.1"
            },
            {
              "status": "affected",
              "version": "17.6.2"
            },
            {
              "status": "affected",
              "version": "17.6.3"
            },
            {
              "status": "affected",
              "version": "17.6.4"
            },
            {
              "status": "affected",
              "version": "17.6.5"
            },
            {
              "status": "affected",
              "version": "17.10.1"
            },
            {
              "status": "affected",
              "version": "17.9.1"
            },
            {
              "status": "affected",
              "version": "17.9.2"
            },
            {
              "status": "affected",
              "version": "17.9.3"
            },
            {
              "status": "affected",
              "version": "17.9.4"
            },
            {
              "status": "affected",
              "version": "17.9.4a"
            },
            {
              "status": "affected",
              "version": "17.7.1"
            },
            {
              "status": "affected",
              "version": "17.8.1"
            },
            {
              "status": "affected",
              "version": "17.11.1"
            },
            {
              "status": "affected",
              "version": "17.12.1"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the IP packet processing of Cisco Access Point (AP) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability is due to insufficient input validation of certain IPv4 packets. An attacker could exploit this vulnerability by sending a crafted IPv4 packet either to or through an affected device. A successful exploit could allow the attacker to cause an affected device to reload unexpectedly, resulting in a DoS condition. To successfully exploit this vulnerability, the attacker does not need to be associated with the affected AP. This vulnerability cannot be exploited by sending IPv6 packets."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "cvssV3_1"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "Improper Input Validation",
              "lang": "en",
              "type": "cwe"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-03-27T17:05:27.473Z",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "cisco-sa-ap-dos-h9TGGX6W",
          "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-dos-h9TGGX6W"
        }
      ],
      "source": {
        "advisory": "cisco-sa-ap-dos-h9TGGX6W",
        "defects": [
          "CSCwh00028"
        ],
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2024-20271",
    "datePublished": "2024-03-27T17:05:27.473Z",
    "dateReserved": "2023-11-08T15:08:07.624Z",
    "dateUpdated": "2024-08-01T21:52:38.878Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}