CVE-2022-20728 (CNNVD-202209-2793)
中文标题:
Cisco Access Points 安全漏洞
英文标题:
Cisco Access Points VLAN Bypass from Native VLAN Vulnerability
漏洞描述
中文描述:
Cisco Access Points是美国思科(Cisco)公司的一款网络接入点设备。 Cisco Access Points 存在安全漏洞,该漏洞源于攻击者绕过VLAN后可以绕过Catalyst Access Point过滤规则实现发送恶意数据。
英文描述:
A vulnerability in the client forwarding code of multiple Cisco Access Points (APs) could allow an unauthenticated, adjacent attacker to inject packets from the native VLAN to clients within nonnative VLANs on an affected device. This vulnerability is due to a logic error on the AP that forwards packets that are destined to a wireless client if they are received on the native VLAN. An attacker could exploit this vulnerability by obtaining access to the native VLAN and directing traffic directly to the client through their MAC/IP combination. A successful exploit could allow the attacker to bypass VLAN separation and potentially also bypass any Layer 3 protection mechanisms that are deployed.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Aironet Access Point Software (IOS XE Controller) | n/a | - | - |
cpe:2.3:a:cisco:cisco_aironet_access_point_software_(ios_xe_controller):n_a:*:*:*:*:*:*:*
|
| cisco | aironet_1542d_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_1542d_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_1542i_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_1542i_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_1562i_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_1562i_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_1562e_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_1562e_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_1562d_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_1562d_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_1815i_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_1815i_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_1815m_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_1815m_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_1815t_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_1815t_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_1815w_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_1815w_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_1830_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_1830_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_1840_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_1840_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_1850e_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_1850e_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_1850i_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_1850i_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_2800i_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_2800i_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_2800e_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_2800e_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_3800i_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_3800i_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_3800e_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_3800e_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_3800p_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_3800p_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | aironet_4800_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:aironet_4800_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | catalyst_9105ax_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:catalyst_9105ax_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | catalyst_9115ax_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:catalyst_9115ax_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | catalyst_9117ax_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:catalyst_9117ax_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | catalyst_9120ax_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:catalyst_9120ax_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | catalyst_9124ax_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:catalyst_9124ax_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | catalyst_9130ax_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:catalyst_9130ax_firmware:017.006\(001\):*:*:*:*:*:*:*
|
| cisco | catalyst_iw6300_firmware | 017.006\(001\) | - | - |
cpe:2.3:o:cisco:catalyst_iw6300_firmware:017.006\(001\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
MEDIUMCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2022-20728 |
2025-11-11 15:21:15 | 2025-11-11 07:37:15 |
| NVD | nvd_CVE-2022-20728 |
2025-11-11 14:58:25 | 2025-11-11 07:45:32 |
| CNNVD | cnnvd_CNNVD-202209-2793 |
2025-11-11 15:11:01 | 2025-11-11 07:57:32 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202209-2793
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 27
- data_sources: ['cve'] -> ['cve', 'nvd']