๐Ÿ” CVE Alert

CVE-2022-20728

MEDIUM 4.7

Cisco Access Points VLAN Bypass from Native VLAN Vulnerability

CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability in the client forwarding code of multiple Cisco Access Points (APs) could allow an unauthenticated, adjacent attacker to inject packets from the native VLAN to clients within nonnative VLANs on an affected device. This vulnerability is due to a logic error on the AP that forwards packets that are destined to a wireless client if they are received on the native VLAN. An attacker could exploit this vulnerability by obtaining access to the native VLAN and directing traffic directly to the client through their MAC/IP combination. A successful exploit could allow the attacker to bypass VLAN separation and potentially also bypass any Layer 3 protection mechanisms that are deployed.

CWE CWE-284
Vendor cisco
Product cisco aironet access point software (ios xe controller)
Ecosystems
Industries
NetworkingTelecommunications
Published Sep 30, 2022
Last Updated Nov 6, 2024
Stay Ahead of the Next One

Get instant alerts for cisco cisco aironet access point software (ios xe controller)

Be the first to know when new medium vulnerabilities affecting cisco cisco aironet access point software (ios xe controller) are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None

Affected Versions

Cisco / Cisco Aironet Access Point Software (IOS XE Controller)
n/a

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
tools.cisco.com: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apvlan-TDTtb4FY