This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2007-04-16
Product Wireless Lan Controller Software Last view 2023-09-27
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:* 21
cpe:2.3:a:cisco:wireless_lan_controller_software:8.0.72.140:*:*:*:*:*:*:* 20
cpe:2.3:a:cisco:wireless_lan_controller_software:7.4.121.0:*:*:*:*:*:*:* 19
cpe:2.3:a:cisco:wireless_lan_controller_software:7.4.1.54:*:*:*:*:*:*:* 19
cpe:2.3:a:cisco:wireless_lan_controller_software:8.0_base:*:*:*:*:*:*:* 18
cpe:2.3:a:cisco:wireless_lan_controller_software:7.5.102.11:*:*:*:*:*:*:* 18
cpe:2.3:a:cisco:wireless_lan_controller_software:7.4.100:*:*:*:*:*:*:* 18
cpe:2.3:a:cisco:wireless_lan_controller_software:7.6.100.0:*:*:*:*:*:*:* 18
cpe:2.3:a:cisco:wireless_lan_controller_software:7.4.110.0:*:*:*:*:*:*:* 18
cpe:2.3:a:cisco:wireless_lan_controller_software:7.5.102.0:*:*:*:*:*:*:* 18
cpe:2.3:a:cisco:wireless_lan_controller_software:8.0.0:*:*:*:*:*:*:* 18
cpe:2.3:a:cisco:wireless_lan_controller_software:8.0.0.30220.385:*:*:*:*:*:*:* 18
cpe:2.3:a:cisco:wireless_lan_controller_software:8.3(141.0):*:*:*:*:*:*:* 16
cpe:2.3:a:cisco:wireless_lan_controller_software:8.1.122.0:*:*:*:*:*:*:* 16
cpe:2.3:a:cisco:wireless_lan_controller_software:8.5(120.0):*:*:*:*:*:*:* 16
cpe:2.3:a:cisco:wireless_lan_controller_software:8.1(111.0):*:*:*:*:*:*:* 16
cpe:2.3:a:cisco:wireless_lan_controller_software:8.1.104.37:*:*:*:*:*:*:* 16
cpe:2.3:a:cisco:wireless_lan_controller_software:8.1.0:*:*:*:*:*:*:* 16
cpe:2.3:a:cisco:wireless_lan_controller_software:8.1.111.0:*:*:*:*:*:*:* 16
cpe:2.3:a:cisco:wireless_lan_controller_software:8.1%28111.0%29:*:*:*:*:*:*:* 15
cpe:2.3:a:cisco:wireless_lan_controller_software:8.5%28120.0%29:*:*:*:*:*:*:* 15
cpe:2.3:a:cisco:wireless_lan_controller_software:8.3%28141.0%29:*:*:*:*:*:*:* 15

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
4.7 2023-09-27 CVE-2023-20268

A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to exhaust resources on an affected device.

This vulnerability is due to insufficient management of resources when handling certain types of traffic. An attacker could exploit this vulnerability by sending a series of specific wireless packets to an affected device. A successful exploit could allow the attacker to consume resources on an affected device. A sustained attack could lead to the disruption of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel and intermittent loss of wireless client traffic.

6.7 2023-03-23 CVE-2023-20097

A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP.

5.5 2023-03-23 CVE-2023-20056

A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition.

6.5 2022-09-30 CVE-2022-20769

A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error validation. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to cause the wireless LAN controller to crash, resulting in a DoS condition. Note: This vulnerability affects only devices that have Federal Information Processing Standards (FIPS) mode enabled.

8.6 2020-09-24 CVE-2020-3560

A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.

6.5 2019-11-26 CVE-2019-15276

A vulnerability in the web interface of Cisco Wireless LAN Controller Software could allow a low-privileged, authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists due to a failure of the HTTP parsing engine to handle specially crafted URLs. An attacker could exploit this vulnerability by authenticating with low privileges to an affected controller and submitting the crafted URL to the web interface of the affected device. Conversely, an unauthenticated attacker could exploit this vulnerability by persuading a user of the web interface to click the crafted URL. A successful exploit could allow the attacker to cause an unexpected restart of the device, resulting in a DoS condition.

4.4 2019-10-16 CVE-2019-15266

A vulnerability in the CLI of Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, local attacker to view system files that should be restricted. This vulnerability is due to improper sanitization of user-supplied input in command-line parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files that may contain sensitive information.

4.9 2019-04-17 CVE-2019-1830

A vulnerability in Locally Significant Certificate (LSC) management for the Cisco Wireless LAN Controller (WLC) could allow an authenticated, remote attacker to cause the device to unexpectedly restart, which causes a denial of service (DoS) condition. The attacker would need to have valid administrator credentials. The vulnerability is due to incorrect input validation of the HTTP URL used to establish a connection to the LSC Certificate Authority (CA). An attacker could exploit this vulnerability by authenticating to the targeted device and configuring a LSC certificate. An exploit could allow the attacker to cause a DoS condition due to an unexpected restart of the device.

4.3 2019-04-17 CVE-2019-1805

A vulnerability in certain access control mechanisms for the Secure Shell (SSH) server implementation for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to access a CLI instance on an affected device. The vulnerability is due to a lack of proper input- and validation-checking mechanisms for inbound SSH connections on an affected device. An attacker could exploit this vulnerability by attempting to establish an SSH connection to an affected controller. An exploit could allow the attacker to access an affected device's CLI to potentially cause further attacks. This vulnerability has been fixed in version 8.5(140.0).

6.5 2019-04-17 CVE-2019-1800

A vulnerability in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerability by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. Software versions prior to 8.2.170.0, 8.5.150.0, and 8.8.100.0 are affected.

6.5 2019-04-17 CVE-2019-1799

A vulnerability in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerability by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. Software versions prior to 8.2.170.0, 8.5.150.0, and 8.8.100.0 are affected.

8.8 2019-04-17 CVE-2019-1797

A vulnerability in the web-based management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on the device with the privileges of the user, including modifying the device configuration. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an interface user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the device with the privileges of the user. Software versions prior to 8.3.150.0, 8.5.135.0, and 8.8.100.0 are affected.

6.5 2019-04-17 CVE-2019-1796

A vulnerability in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerability by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. Software versions prior to 8.2.170.0, 8.5.150.0, and 8.8.100.0 are affected.

7.5 2019-04-17 CVE-2018-0382

A vulnerability in the session identification management functionality of the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system. The vulnerability exists because the affected software does not properly clear previously assigned session identifiers for a user session when a user authenticates to the web-based interface. An attacker could exploit this vulnerability by using an existing session identifier to connect to the software through the web-based interface. Successful exploitation could allow the attacker to hijack an authenticated user's browser session on the system. Versions 8.1 and 8.5 are affected.

4.9 2019-04-17 CVE-2018-0248

A vulnerability in the administrative GUI configuration feature of Cisco Wireless LAN Controller (WLC) Software could allow an aUTHENTICated, remote attacker to cause the device to reload unexpectedly during device configuration when the administrator is using this GUI, causing a denial of service (DoS) condition on an affected device. The attacker would need to have valid administrator credentials on the device. This vulnerability is due to incomplete input validation for unexpected configuration options that the attacker could submit while accessing the GUI configuration menus. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted user input when using the administrative GUI configuration feature. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Software versions prior to 8.3.150.0, 8.5.140.0, 8.8.111.0 are affected by this vulnerability.

7.5 2018-10-17 CVE-2018-0442

A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to retrieve memory contents, which could lead to the disclosure of confidential information. The vulnerability is due to insufficient condition checks in the part of the code that handles CAPWAP keepalive requests. An attacker could exploit this vulnerability by sending a crafted CAPWAP keepalive packet to a vulnerable Cisco WLC device. A successful exploit could allow the attacker to retrieve the contents of device memory, which could lead to the disclosure of confidential information.

7.8 2018-10-17 CVE-2018-0417

A vulnerability in TACACS authentication with Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, local attacker to perform certain operations within the GUI that are not normally available to that user on the CLI. The vulnerability is due to incorrect parsing of a specific TACACS attribute received in the TACACS response from the remote TACACS server. An attacker could exploit this vulnerability by authenticating via TACACS to the GUI on the affected device. A successful exploit could allow an attacker to create local user accounts with administrative privileges on an affected WLC and execute other commands that are not allowed from the CLI and should be prohibited.

5.3 2016-09-11 CVE-2016-6375

Cisco Wireless LAN Controller (WLC) devices before 8.0.140.0, 8.1.x and 8.2.x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow remote attackers to cause a denial of service (device reload) by sending crafted Inter-Access Point Protocol (IAPP) packets and then sending a traffic stream metrics (TSM) information request over SNMP, aka Bug ID CSCuz40221.

6.5 2016-07-27 CVE-2016-1460

Cisco Wireless LAN Controller (WLC) devices 7.4(121.0) and 8.0(0.30220.385) allow remote attackers to cause a denial of service via crafted wireless management frames, aka Bug ID CSCun92979.

7.5 2016-04-21 CVE-2016-1364

Cisco Wireless LAN Controller (WLC) Software 7.4 before 7.4.130.0(MD) and 7.5, 7.6, and 8.0 before 8.0.110.0(ED) allows remote attackers to cause a denial of service (device reload) via crafted Bonjour traffic, aka Bug ID CSCur66908.

9.8 2016-04-21 CVE-2016-1363

Buffer overflow in the redirection functionality in Cisco Wireless LAN Controller (WLC) Software 7.2 through 7.4 before 7.4.140.0(MD) and 7.5 through 8.0 before 8.0.115.0(ED) allows remote attackers to execute arbitrary code via a crafted HTTP request, aka Bug ID CSCus25617.

9.8 2016-01-14 CVE-2015-6314

Cisco Wireless LAN Controller (WLC) devices with software 7.6.x, 8.0 before 8.0.121.0, and 8.1 before 8.1.131.0 allow remote attackers to change configuration settings via unspecified vectors, aka Bug ID CSCuw06153.

4.3 2015-04-06 CVE-2015-0690

Cross-site scripting (XSS) vulnerability in the HTML help system on Cisco Wireless LAN Controller (WLC) devices before 8.0 allows remote attackers to inject arbitrary web script or HTML via a crafted URL, aka Bug ID CSCun95178.

6.1 2013-02-28 CVE-2013-1141

The mDNS snooping functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.4.1.54 and earlier does not properly manage buffers, which allows remote authenticated users to cause a denial of service (device reload) via crafted mDNS packets, aka Bug ID CSCue04153.

6.2 2007-04-16 CVE-2007-2040

Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192.

CWE : Common Weakness Enumeration

%idName
34% (8) CWE-20 Improper Input Validation
21% (5) CWE-399 Resource Management Errors
8% (2) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
8% (2) CWE-287 Improper Authentication
4% (1) CWE-787 Out-of-bounds Write
4% (1) CWE-352 Cross-Site Request Forgery (CSRF)
4% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
4% (1) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
4% (1) CWE-77 Improper Sanitization of Special Elements used in a Command ('Comma...
4% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...

Open Source Vulnerability Database (OSVDB)

id Description
34139 Cisco Wireless LAN Controller (WLC) Network Processing Unit (NPU) Malformed H...
34137 Cisco Wireless LAN Controller (WLC) Network Processing Unit (NPU) Malformed 8...
34135 Cisco Wireless LAN Controller (WLC) Malformed Ethernet Traffic DoS
34133 Cisco Aironet Lightweight Access Points Persistent Admin Password

Snort® IPS/IDS

Date Description
2020-12-05 Cisco Wireless LAN Controller denial of service attempt
RuleID : 52126 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco Wireless LAN Controller IAPP message denial of service attempt
RuleID : 49879 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco Wireless LAN Controller denial of service attempt
RuleID : 49867 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco Wireless LAN Controller denial of service attempt
RuleID : 49866 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco Wireless LAN Controller cross site request forgery attempt
RuleID : 49859 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco Wireless LAN Controller CAPWAP information disclosure attempt
RuleID : 48204 - Type : SERVER-OTHER - Revision : 4
2016-03-14 Cisco WLAN Controller insecure configuration wizard access attempt
RuleID : 38087 - Type : SERVER-WEBAPP - Revision : 1

Nessus® Vulnerability Scanner

id Description
2018-10-26 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20181017-wlc-capwap-memory-leak.nasl - Type: ACT_GATHER_INFO
2016-10-18 Name: The remote device is missing vendor-supplied security patches.
File: cisco-sa-20160831-wlc.nasl - Type: ACT_GATHER_INFO
2016-05-04 Name: The remote device is missing vendor-supplied security patches.
File: cisco-sa-20160420-htrd-bdos-wlc.nasl - Type: ACT_GATHER_INFO
2016-01-22 Name: The remote device is missing a vendor-supplied security update.
File: cisco-sa-20160113-wlc.nasl - Type: ACT_GATHER_INFO