CVE-2023-20112 (CNNVD-202303-1885)
中文标题:
Cisco Access Point 缓冲区错误漏洞
英文标题:
Cisco Access Point Software Association Request Denial of Service Vulnerability
漏洞描述
中文描述:
Cisco Access Point是美国思科(Cisco)公司的一款网络接入点设备。为小型办公室提供高密度无线连接。 Cisco Access Point 存在安全漏洞,该漏洞源于 802 内的某些参数验证不充分。
英文描述:
A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an affected device, resulting in a DoS condition.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco Aironet Access Point Software | n/a | - | - |
cpe:2.3:a:cisco:cisco_aironet_access_point_software_:n_a:*:*:*:*:*:*:*
|
| cisco | business_150ax_firmware | * | - | - |
cpe:2.3:o:cisco:business_150ax_firmware:*:*:*:*:*:*:*:*
|
| cisco | business_151axm_firmware | * | - | - |
cpe:2.3:o:cisco:business_151axm_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9105ax_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9105ax_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9105axi_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9105axi_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9105axw_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9105axw_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9105i_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9105i_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9105w_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9105w_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9115_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9115_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9115ax_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9115ax_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9115axe_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9115axe_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9115axi_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9115axi_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9117_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9117_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9117ax_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9117ax_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9117axi_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9117axi_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9120_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9120_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9120ax_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9120ax_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9120axe_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9120axe_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9120axi_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9120axi_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9120axp_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9120axp_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9124_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9124_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9124ax_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9124ax_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9124axd_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9124axd_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9124axi_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9124axi_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9130_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9130_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9130ax_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9130ax_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9130axe_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9130axe_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9130axi_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9130axi_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9136_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9136_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9162_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9162_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9164_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9164_firmware:*:*:*:*:*:*:*:*
|
| cisco | catalyst_9166_firmware | * | - | - |
cpe:2.3:o:cisco:catalyst_9166_firmware:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2023-20112 |
2025-11-11 15:21:47 | 2025-11-11 07:38:02 |
| NVD | nvd_CVE-2023-20112 |
2025-11-11 14:58:58 | 2025-11-11 07:46:12 |
| CNNVD | cnnvd_CNNVD-202303-1885 |
2025-11-11 15:11:09 | 2025-11-11 07:57:51 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 缓冲区错误
- cnnvd_id: 未提取 -> CNNVD-202303-1885
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 32
- data_sources: ['cve'] -> ['cve', 'nvd']