...
NONE
17.3.6 APSP7 = CSCwd83653 (IOS AP) + CSCwd89180 (COS AP). We found when previously APSPs were built per platform, each WLC platform had unique version for AP images. So if a customer would upgrade from 9800-L to 9840, APs would need to download AP software again. This APSP is going to be built to address this limitation for seamless AP moves.
Following Fixes are committed: CSCvx32806 COS-APs stuck in bootloop due to image checksum verification failed CSCwc32182 AP 1852 Radio Firmware Crash (SF 06029787/06121536/06208256) CSCvz99036 Cisco Access Points VLAN Bypass from Native VLAN Vulnerability CSCwd37092 Slow TCP downloads, failing TLS authentications in 8.10.181.0/17.3.6 - 2800/3800/4800 series CSCwc78435 9130 sending incorrect channel list on out of band DFS event causing client connectivity issues CSCwc88148 Additional enhancement for mac suspend issue (CSCwc72194) on driver side. CSCwd80290 IOS AP image validation certificate Failed/Expired; causing AP join issues.
If a customer has any of the bug fixes required on AP. They can install the APSP. To install APSP, customer has to make sure WLC is on 17.3.6 and follow following APSP upgrade procedure. https://www.cisco.com/c/dam/en/us/td/docs/wireless/controller/9800/17-1/deployment-guide/c9800-ha-rau-apsp-apdp-issu-rel-17-1.pdf (Page 6)
FN - 72524 - During Software Upgrade/Downgrade, Cisco IOS APs Might Remain in Downloading State After December 4, 2022 Due to Certificate Expiration - Workaround Provided Upgrade/Downgrade after Dec 4 2022 for IOS APs. For More details: https://www.cisco.com/c/en/us/support/docs/field-notices/725/fn72524.html
Install the APSP with IOS-XE Software 17.3.6 PSIRT Evaluation: The Cisco PSIRT has evaluated this issue and determined it does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels. If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html