Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Catalyst_9136_firmware
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 2 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-03-23 | CVE-2023-20112 | A vulnerability in Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of certain parameters within 802.11 frames. An attacker could exploit this vulnerability by sending a wireless 802.11 association request frame with crafted parameters to an affected device. A successful exploit could allow the attacker to cause an unexpected reload of an... | Business_150ax_firmware, Business_151axm_firmware, Catalyst_9105ax_firmware, Catalyst_9105axi_firmware, Catalyst_9105axw_firmware, Catalyst_9105i_firmware, Catalyst_9105w_firmware, Catalyst_9115_firmware, Catalyst_9115ax_firmware, Catalyst_9115axe_firmware, Catalyst_9115axi_firmware, Catalyst_9117_firmware, Catalyst_9117ax_firmware, Catalyst_9117axi_firmware, Catalyst_9120_firmware, Catalyst_9120ax_firmware, Catalyst_9120axe_firmware, Catalyst_9120axi_firmware, Catalyst_9120axp_firmware, Catalyst_9124_firmware, Catalyst_9124ax_firmware, Catalyst_9124axd_firmware, Catalyst_9124axi_firmware, Catalyst_9130_firmware, Catalyst_9130ax_firmware, Catalyst_9130axe_firmware, Catalyst_9130axi_firmware, Catalyst_9136_firmware, Catalyst_9162_firmware, Catalyst_9164_firmware, Catalyst_9166_firmware | 6.5 | ||
2023-09-27 | CVE-2023-20176 | A vulnerability in the networking component of Cisco access point (AP) software could allow an unauthenticated, remote attacker to cause a temporary disruption of service. This vulnerability is due to overuse of AP resources. An attacker could exploit this vulnerability by connecting to an AP on an affected device as a wireless client and sending a high rate of traffic over an extended period of time. A successful exploit could allow the attacker to cause the Datagram TLS (DTLS) session... | Catalyst_9124_firmware, Catalyst_9130_firmware, Catalyst_9136_firmware, Catalyst_9164_firmware, Catalyst_9166_firmware | 8.6 |