

Rewterz Threat Advisory – CVE-2022-20769 – Cisco Wireless LAN Controller (WLC) AireOS Software Vulnerability
September 29, 2022
Rewterz Threat Advisory – Multiple Cisco IOS XE Software Vulnerabilities
September 29, 2022
Rewterz Threat Advisory – CVE-2022-20769 – Cisco Wireless LAN Controller (WLC) AireOS Software Vulnerability
September 29, 2022
Rewterz Threat Advisory – Multiple Cisco IOS XE Software Vulnerabilities
September 29, 2022Severity
Medium
Analysis Summary
CVE-2022-20728
Cisco Access Points could allow a remote attacker to bypass security restrictions, caused by a logic error on the AP. By obtaining access to the native VLAN and directing traffic directly to the client through their MAC/IP combination, an attacker could exploit this vulnerability to bypass VLAN separation and potentially also bypass any Layer 3 protection mechanisms.
Impact
- Security Bypass
Indicators Of Compromise
CVE
- CVE-2022-20728
Affected Vendors
Cisco
Affected Products
- Cisco Aironet 1800 Series Access Point
- Cisco Aironet 3800 Series Access Point
- Cisco Aironet 1560 Series Access Point
- Cisco Aironet 1540 Series Access Point
- Cisco Aironet 4800 Series Access Point
- Cisco Integrated AP on 1100 Integrated Services Routers
- Cisco 6300 Series Embedded Services APs (ESW6300)
- Cisco Business 100 Series Access Points
- Cisco Business 200 Series Access Points
- Cisco Catalyst 9100 Access Points
- Cisco Catalyst IW 6300 Heavy Duty Series Access Points
Remediation
Refer to Cisco Security Advisory for patch, upgrade or suggested workaround information.