A vulnerability in the client forwarding code of multiple Cisco Access Points (APs) could allow an unauthenticated, adjacent attacker to inject packets from the native VLAN to clients within nonnative VLANs on an affected device. This vulnerability is due to a logic error on the AP that forwards packets that are destined to a wireless client if they are received on the native VLAN. An attacker could exploit this vulnerability by obtaining access to the native VLAN and directing traffic directly to the client through their MAC/IP combination. A successful exploit could allow the attacker to bypass VLAN separation and potentially also bypass any Layer 3 protection mechanisms that are deployed.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Aironet 1542d
Subscribe
Aironet 1542d Firmware
Subscribe
Aironet 1542i
Subscribe
Aironet 1542i Firmware
Subscribe
Aironet 1562d
Subscribe
Aironet 1562d Firmware
Subscribe
Aironet 1562e
Subscribe
Aironet 1562e Firmware
Subscribe
Aironet 1562i
Subscribe
Aironet 1562i Firmware
Subscribe
Aironet 1815i
Subscribe
Aironet 1815i Firmware
Subscribe
Aironet 1815m
Subscribe
Aironet 1815m Firmware
Subscribe
Aironet 1815t
Subscribe
Aironet 1815t Firmware
Subscribe
Aironet 1815w
Subscribe
Aironet 1815w Firmware
Subscribe
Aironet 1830
Subscribe
Aironet 1830 Firmware
Subscribe
Aironet 1840
Subscribe
Aironet 1840 Firmware
Subscribe
Aironet 1850e
Subscribe
Aironet 1850e Firmware
Subscribe
Aironet 1850i
Subscribe
Aironet 1850i Firmware
Subscribe
Aironet 2800e
Subscribe
Aironet 2800e Firmware
Subscribe
Aironet 2800i
Subscribe
Aironet 2800i Firmware
Subscribe
Aironet 3800e
Subscribe
Aironet 3800e Firmware
Subscribe
Aironet 3800i
Subscribe
Aironet 3800i Firmware
Subscribe
Aironet 3800p
Subscribe
Aironet 3800p Firmware
Subscribe
Aironet 4800
Subscribe
Aironet 4800 Firmware
Subscribe
Catalyst 9105ax
Subscribe
Catalyst 9105ax Firmware
Subscribe
Catalyst 9115ax
Subscribe
Catalyst 9115ax Firmware
Subscribe
Catalyst 9117ax
Subscribe
Catalyst 9117ax Firmware
Subscribe
Catalyst 9120ax
Subscribe
Catalyst 9120ax Firmware
Subscribe
Catalyst 9124ax
Subscribe
Catalyst 9124ax Firmware
Subscribe
Catalyst 9130ax
Subscribe
Catalyst 9130ax Firmware
Subscribe
Catalyst Iw6300
Subscribe
Catalyst Iw6300 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-25978 | A vulnerability in the client forwarding code of multiple Cisco Access Points (APs) could allow an unauthenticated, adjacent attacker to inject packets from the native VLAN to clients within nonnative VLANs on an affected device. This vulnerability is due to a logic error on the AP that forwards packets that are destined to a wireless client if they are received on the native VLAN. An attacker could exploit this vulnerability by obtaining access to the native VLAN and directing traffic directly to the client through their MAC/IP combination. A successful exploit could allow the attacker to bypass VLAN separation and potentially also bypass any Layer 3 protection mechanisms that are deployed. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 06 Nov 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-06T16:06:38.935Z
Reserved: 2021-11-02T00:00:00
Link: CVE-2022-20728
Updated: 2024-08-03T02:24:49.347Z
Status : Modified
Published: 2022-09-30T19:15:10.903
Modified: 2024-11-21T06:43:25.730
Link: CVE-2022-20728
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD