{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T15:45:08.800","vulnerabilities":[{"cve":{"id":"CVE-2023-20202","sourceIdentifier":"psirt@cisco.com","published":"2023-09-27T18:15:11.177","lastModified":"2024-11-21T07:40:49.307","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of network requests to an affected device. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to reload, resulting in a DoS condition."},{"lang":"es","value":"Una vulnerabilidad en el Wireless Network Control daemon (wncd) del software Cisco IOS XE para controladores de LAN inalámbrica podría permitir que un atacante adyacente no autenticado provoque una condición de denegación de servicio (DoS). Esta vulnerabilidad se debe a una gestión inadecuada de la memoria. Un atacante podría aprovechar esta vulnerabilidad enviando una serie de solicitudes de red a un dispositivo afectado. Un exploit exitoso podría permitir que el atacante haga que el proceso wncd consuma memoria disponible y, eventualmente, haga que el dispositivo se recargue, lo que resultaría en una condición DoS."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-789"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*","matchCriteriaId":"5B0C2129-8149-4362-827C-A5494C9D398B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*","matchCriteriaId":"7452C7E9-6241-42C5-9A7F-13C0BD38A2B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*","matchCriteriaId":"38C48FC4-5362-4B61-8B8C-7CAFFB81045E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*","matchCriteriaId":"2BC43383-DF99-4D38-A220-0A202623B36A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*","matchCriteriaId":"B7E6CD08-EC7E-42C1-B2C2-CA5E154545A0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*","matchCriteriaId":"DE62DC68-E882-49E7-AAD2-2F73637FFB4A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*","matchCriteriaId":"D197445E-EC12-429C-BDD4-F63FA5C1B3E3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*","matchCriteriaId":"BD27DF50-9E81-4EC5-BA73-513F1DFB972C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.9.2b:*:*:*:*:*:*:*","matchCriteriaId":"91A099C9-0C81-4819-BE4A-FE59144C55BD"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*","matchCriteriaId":"42FAEC29-D754-49D6-85F1-F5DDFAF6E80F"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*","matchCriteriaId":"CCE76032-948F-444F-BA5D-72A34D1CD382"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*","matchCriteriaId":"9A965A2A-129C-45C3-BCB1-2860F583D020"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9105i:-:*:*:*:*:*:*:*","matchCriteriaId":"93510CF6-232E-4FBD-BF01-79070306FB97"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9105w:-:*:*:*:*:*:*:*","matchCriteriaId":"77BE20A3-964E-46D3-ACA2-B53A175027D9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9115:-:*:*:*:*:*:*:*","matchCriteriaId":"4081C532-3B10-4FBF-BB22-5BA17BC6FCF8"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9120:-:*:*:*:*:*:*:*","matchCriteriaId":"A47C2D6F-8F90-4D74-AFE1-EAE954021F46"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9124d:-:*:*:*:*:*:*:*","matchCriteriaId":"D7E3AD79-8F3B-4E8E-8226-2B5101F1A3D2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9124e:-:*:*:*:*:*:*:*","matchCriteriaId":"8B64B8AB-DD2A-4306-8546-1D64E24868F4"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9124i:-:*:*:*:*:*:*:*","matchCriteriaId":"54712AF5-EF16-4F83-99BB-D3B8D93AF986"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9130:-:*:*:*:*:*:*:*","matchCriteriaId":"E1C8E35A-5A9B-4D56-A753-937D5CFB5B19"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9136:-:*:*:*:*:*:*:*","matchCriteriaId":"09185C81-6FDF-4E6D-B8F7-E4B5D77909F4"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9162:-:*:*:*:*:*:*:*","matchCriteriaId":"C9347227-9FA8-46B6-96EF-713543376296"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9164:-:*:*:*:*:*:*:*","matchCriteriaId":"96E81F0A-5B5C-4DD3-A56F-C7BF53D4B070"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9166:-:*:*:*:*:*:*:*","matchCriteriaId":"774AEB3E-5D6A-4E66-B0B4-C014A7C180E6"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9166d1:-:*:*:*:*:*:*:*","matchCriteriaId":"E5133F50-F67C-4195-B18F-887EFC88FA52"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*","matchCriteriaId":"1B9ED0E5-CB20-4106-9CF2-8EB587B33543"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*","matchCriteriaId":"2B0E620C-8E09-4F7C-A326-26013173B993"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-cl:-:*:*:*:*:*:*:*","matchCriteriaId":"FF93F1C8-669F-4ECB-8D81-ECDA7B550175"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*","matchCriteriaId":"2E0BA345-B7D7-4975-9199-4DC7875BBFD0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:catalyst_iw6300:-:*:*:*:*:*:*:*","matchCriteriaId":"C559D6F7-B432-4A2A-BE0E-9697CC412C70"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:esw6300:-:*:*:*:*:*:*:*","matchCriteriaId":"09051BC5-CFE7-43EF-975D-BF77724E8776"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:iw9167eh-x-ap:-:*:*:*:*:*:*:*","matchCriteriaId":"7DAC9FCA-D624-4A7D-9FA6-3D163FFE7453"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:iw9167eh-x-urwb:-:*:*:*:*:*:*:*","matchCriteriaId":"08D5D1CC-0D0A-4034-8147-B5574EE42385"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:iw9167eh-x-wgb:-:*:*:*:*:*:*:*","matchCriteriaId":"D2180290-8F76-4BF6-8480-1FC9D1B0D93B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:iw9167ih-x-ap:-:*:*:*:*:*:*:*","matchCriteriaId":"B01614D9-3D1E-4E8D-B535-20282EBECE6B"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-wncd-HFGMsfSD","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-wncd-HFGMsfSD","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}