Unauthenticated DoS via Wi-Fi Uplink PAPI on Cisco Wireless Controller
CVE-2023-45623 Published on November 14, 2023
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Wi-Fi Uplink service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
Vulnerability Analysis
CVE-2023-45623 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.
Products Associated with CVE-2023-45623
stack.watch emails you whenever new vulnerabilities are published in Aruba Networks Arubaos or HP Instantos. Just hit a watch button to start following.
Affected Versions
Hewlett Packard Enterprise (HPE) Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; :- Version ArubaOS 10.5.x.x: 10.5.0.0 and below is affected.
- Version ArubaOS 10.4.x.x: 10.4.0.2 and below is affected.
- Version InstantOS 8.11.x.x: 8.11.1.2 and below is affected.
- Version InstantOS 8.10.x.x: 8.10.0.8 and below is affected.
- Version InstantOS 8.6.x.x: 8.6.0.22 and below is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.