PT-2026-27791 · Cisco · Catalyst Cw9800+1
Published
2026-03-25
·
Updated
2026-03-25
·
CVE-2026-20086
CVSS v3.1
8.6
High
| AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
Name of the Vulnerable Software and Affected Versions
Cisco IOS XE Wireless Controller Software for the Catalyst CW9800 Family (affected versions not specified)
Description
A flaw exists in how the software processes Control and Provisioning of Wireless Access Points (CAPWAP) packets. This could allow a remote attacker, without needing to authenticate, to disrupt service on a device. The issue stems from the software's inability to correctly handle a specially crafted CAPWAP packet. Sending such a packet could force the device to restart unexpectedly, leading to a denial of service.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Catalyst Cw9800
Cisco Ios Xe Wireless Controller