This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2007-04-16
Product Wireless Lan Controller Software Last view 2023-09-27
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:* 33
cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.182.0:*:*:*:*:*:*:* 31
cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:* 31
cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.117.0:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.151.0:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.174.0:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.99.0:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:6.0:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.160.0:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.176.0:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.61.0:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.112.0:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.130.0:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.152.0:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:4.1:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.182.0:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.0:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.2:*:*:*:*:*:*:* 30
cpe:2.3:o:cisco:wireless_lan_controller_software:7.2:*:*:*:*:*:*:* 29
cpe:2.3:o:cisco:wireless_lan_controller_software:5.1:*:*:*:*:*:*:* 29
cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.0:*:*:*:*:*:*:* 29
cpe:2.3:o:cisco:wireless_lan_controller_software:7.0.98.0:*:*:*:*:*:*:* 28
cpe:2.3:o:cisco:wireless_lan_controller_software:5.2:*:*:*:*:*:*:* 28
cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.108:*:*:*:*:*:*:* 28
cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.5:*:*:*:*:*:*:* 27
cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.11:*:*:*:*:*:*:* 27
cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.169.0:*:*:*:*:*:*:* 27
cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.157.0:*:*:*:*:*:*:* 27
cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.8:*:*:*:*:*:*:* 27
cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.196:*:*:*:*:*:*:* 27
cpe:2.3:o:cisco:wireless_lan_controller_software:4.0:*:*:*:*:*:*:* 27
cpe:2.3:o:cisco:wireless_lan_controller_software:7.2.110.0:*:*:*:*:*:*:* 27
cpe:2.3:o:cisco:wireless_lan_controller_software:7.0:*:*:*:*:*:*:* 27
cpe:2.3:o:cisco:wireless_lan_controller_software:7.3:*:*:*:*:*:*:* 26
cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.219.0:*:*:*:*:*:*:* 26
cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.217.0:*:*:*:*:*:*:* 26
cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.206.0:*:*:*:*:*:*:* 26
cpe:2.3:o:cisco:wireless_lan_controller_software:7.3.101.0:*:*:*:*:*:*:* 25
cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.116.21:*:*:*:*:*:*:* 25
cpe:2.3:o:cisco:wireless_lan_controller_software:-:*:*:*:*:*:*:* 25
cpe:2.3:o:cisco:wireless_lan_controller_software:7.1:*:*:*:*:*:*:* 25
cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.185.0:*:*:*:*:*:*:* 24
cpe:2.3:o:cisco:wireless_lan_controller_software:4.2m:*:*:*:*:*:*:* 24
cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.171.0:*:*:*:*:*:*:* 24
cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.181.0:*:*:*:*:*:*:* 24
cpe:2.3:o:cisco:wireless_lan_controller_software:3.2:*:*:*:*:*:*:* 24
cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.199.0:*:*:*:*:*:*:* 24
cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.188.0:*:*:*:*:*:*:* 24
cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.199.4:*:*:*:*:*:*:* 24
cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.196.0:*:*:*:*:*:*:* 24

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
4.7 2023-09-27 CVE-2023-20268

A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to exhaust resources on an affected device.

This vulnerability is due to insufficient management of resources when handling certain types of traffic. An attacker could exploit this vulnerability by sending a series of specific wireless packets to an affected device. A successful exploit could allow the attacker to consume resources on an affected device. A sustained attack could lead to the disruption of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel and intermittent loss of wireless client traffic.

6.7 2023-03-23 CVE-2023-20097

A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP.

5.5 2023-03-23 CVE-2023-20056

A vulnerability in the management CLI of Cisco access point (AP) software could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation of commands supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input to the affected command. A successful exploit could allow the attacker to cause an affected device to reload spontaneously, resulting in a DoS condition.

6.5 2022-09-30 CVE-2022-20769

A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error validation. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to cause the wireless LAN controller to crash, resulting in a DoS condition. Note: This vulnerability affects only devices that have Federal Information Processing Standards (FIPS) mode enabled.

8.6 2020-09-24 CVE-2020-3560

A vulnerability in Cisco Aironet Access Points (APs) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on an affected device. The vulnerability is due to improper resource management while processing specific packets. An attacker could exploit this vulnerability by sending a series of crafted UDP packets to a specific port on an affected device. A successful exploit could either allow the attacker to tear down the connection between the AP and the wireless LAN controller, resulting in the affected device not being able to process client traffic, or cause the vulnerable device to reload, triggering a DoS condition. After the attack, the affected device should automatically recover its normal functions without manual intervention.

6.5 2019-11-26 CVE-2019-15276

A vulnerability in the web interface of Cisco Wireless LAN Controller Software could allow a low-privileged, authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists due to a failure of the HTTP parsing engine to handle specially crafted URLs. An attacker could exploit this vulnerability by authenticating with low privileges to an affected controller and submitting the crafted URL to the web interface of the affected device. Conversely, an unauthenticated attacker could exploit this vulnerability by persuading a user of the web interface to click the crafted URL. A successful exploit could allow the attacker to cause an unexpected restart of the device, resulting in a DoS condition.

4.4 2019-10-16 CVE-2019-15266

A vulnerability in the CLI of Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, local attacker to view system files that should be restricted. This vulnerability is due to improper sanitization of user-supplied input in command-line parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files that may contain sensitive information.

4.9 2019-04-17 CVE-2019-1830

A vulnerability in Locally Significant Certificate (LSC) management for the Cisco Wireless LAN Controller (WLC) could allow an authenticated, remote attacker to cause the device to unexpectedly restart, which causes a denial of service (DoS) condition. The attacker would need to have valid administrator credentials. The vulnerability is due to incorrect input validation of the HTTP URL used to establish a connection to the LSC Certificate Authority (CA). An attacker could exploit this vulnerability by authenticating to the targeted device and configuring a LSC certificate. An exploit could allow the attacker to cause a DoS condition due to an unexpected restart of the device.

6.5 2019-04-17 CVE-2019-1800

A vulnerability in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerability by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. Software versions prior to 8.2.170.0, 8.5.150.0, and 8.8.100.0 are affected.

6.5 2019-04-17 CVE-2019-1799

A vulnerability in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerability by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. Software versions prior to 8.2.170.0, 8.5.150.0, and 8.8.100.0 are affected.

8.8 2019-04-17 CVE-2019-1797

A vulnerability in the web-based management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on the device with the privileges of the user, including modifying the device configuration. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an interface user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the device with the privileges of the user. Software versions prior to 8.3.150.0, 8.5.135.0, and 8.8.100.0 are affected.

6.5 2019-04-17 CVE-2019-1796

A vulnerability in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerability by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. Software versions prior to 8.2.170.0, 8.5.150.0, and 8.8.100.0 are affected.

4.9 2019-04-17 CVE-2018-0248

A vulnerability in the administrative GUI configuration feature of Cisco Wireless LAN Controller (WLC) Software could allow an aUTHENTICated, remote attacker to cause the device to reload unexpectedly during device configuration when the administrator is using this GUI, causing a denial of service (DoS) condition on an affected device. The attacker would need to have valid administrator credentials on the device. This vulnerability is due to incomplete input validation for unexpected configuration options that the attacker could submit while accessing the GUI configuration menus. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted user input when using the administrative GUI configuration feature. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Software versions prior to 8.3.150.0, 8.5.140.0, 8.8.111.0 are affected by this vulnerability.

5.4 2018-10-17 CVE-2018-15395

A vulnerability in the authentication and authorization checking mechanisms of Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, adjacent attacker to gain network access to a Cisco TrustSec domain. Under normal circumstances, this access should be prohibited. The vulnerability is due to the dynamic assignment of Security Group Tags (SGTs) during a wireless roam from one Service Set Identifier (SSID) to another within the Cisco TrustSec domain. An attacker could exploit this vulnerability by attempting to acquire an SGT from other SSIDs within the domain. Successful exploitation could allow the attacker to gain privileged network access that should be prohibited under normal circumstances.

7.5 2018-10-17 CVE-2018-0443

A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper input validation on fields within CAPWAP Discovery Request packets by the affected device. An attacker could exploit this vulnerability by sending malicious CAPWAP Discovery Request packets to the Cisco WLC Software. A successful exploit could allow the attacker to cause the Cisco WLC Software to disconnect associated access points (APs). While the APs disconnect and reconnect, service will be unavailable for a brief period of time, resulting in a DoS condition.

7.5 2018-10-17 CVE-2018-0442

A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to retrieve memory contents, which could lead to the disclosure of confidential information. The vulnerability is due to insufficient condition checks in the part of the code that handles CAPWAP keepalive requests. An attacker could exploit this vulnerability by sending a crafted CAPWAP keepalive packet to a vulnerable Cisco WLC device. A successful exploit could allow the attacker to retrieve the contents of device memory, which could lead to the disclosure of confidential information.

6.5 2018-10-17 CVE-2018-0420

A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames and pathnames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files on the targeted device, which may contain sensitive information.

7.8 2018-10-17 CVE-2018-0417

A vulnerability in TACACS authentication with Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, local attacker to perform certain operations within the GUI that are not normally available to that user on the CLI. The vulnerability is due to incorrect parsing of a specific TACACS attribute received in the TACACS response from the remote TACACS server. An attacker could exploit this vulnerability by authenticating via TACACS to the GUI on the affected device. A successful exploit could allow an attacker to create local user accounts with administrative privileges on an affected WLC and execute other commands that are not allowed from the CLI and should be prohibited.

5.3 2018-10-17 CVE-2018-0416

A vulnerability in the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to view system information that under normal circumstances should be prohibited. The vulnerability is due to incomplete input and validation checking mechanisms in the web-based interface URL request. An attacker could exploit this vulnerability by requesting specific URLs via the web-based interface. A successful exploit could allow the attacker to view sensitive system information.

4.8 2018-10-17 CVE-2018-0388

A vulnerability in the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.

8.6 2018-05-02 CVE-2018-0252

A vulnerability in the IP Version 4 (IPv4) fragment reassembly function of Cisco 3500, 5500, and 8500 Series Wireless LAN Controller Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to a corruption of an internal data structure process that occurs when the affected software reassembles certain IPv4 packets. An attacker could exploit this vulnerability by sending certain malformed IPv4 fragments to an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. This vulnerability affects all releases of 8.4 until the first fixed release for the 5500 and 8500 Series Wireless LAN Controllers and releases 8.5.103.0 and 8.5.105.0 for the 3500, 5500, and 8500 Series Wireless LAN Controllers. Cisco Bug IDs: CSCvf89222.

4.7 2018-05-02 CVE-2018-0247

A vulnerability in Web Authentication (WebAuth) clients for the Cisco Wireless LAN Controller (WLC) and Aironet Access Points running Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic. The vulnerability is due to incorrect implementation of authentication for WebAuth clients in a specific configuration. An attacker could exploit this vulnerability by sending traffic to local network resources without having gone through authentication. A successful exploit could allow the attacker to bypass authentication and pass traffic. This affects Cisco Aironet Access Points running Cisco IOS Software and Cisco Wireless LAN Controller (WLC) releases prior to 8.5.110.0 for the following specific WLC configuration only: (1) The Access Point (AP) is configured in FlexConnect Mode with NAT. (2) The WLAN is configured for central switching, meaning the client is being assigned a unique IP address. (3) The AP is configured with a Split Tunnel access control list (ACL) for access to local network resources, meaning the AP is doing the NAT on the connection. (4) The client is using WebAuth. This vulnerability does not apply to .1x clients in the same configuration. Cisco Bug IDs: CSCvc79502, CSCvf71789.

5.3 2018-05-02 CVE-2018-0245

A vulnerability in the REST API of Cisco 5500 and 8500 Series Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to view system information that under normal circumstances should be prohibited. The vulnerability is due to incomplete input and validation checking mechanisms in the REST API URL request. An attacker could exploit this vulnerability by sending a malicious URL to the REST API. If successful, an exploit could allow the attacker to view sensitive system information. Cisco Bug IDs: CSCvg89442.

7.4 2018-05-02 CVE-2018-0235

A vulnerability in the 802.11 frame validation functionality of the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation of certain 802.11 management information element frames that an affected device receives from wireless clients. An attacker could exploit this vulnerability by sending a malformed 802.11 management frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload unexpectedly, resulting in a DoS condition. This vulnerability affects only Cisco Wireless LAN Controllers that are running Cisco Mobility Express Release 8.5.103.0. Cisco Bug IDs: CSCvg07024.

6.1 2017-11-02 CVE-2017-12282

A vulnerability in the Access Network Query Protocol (ANQP) ingress frame processing functionality of Cisco Wireless LAN Controllers could allow an unauthenticated, Layer 2 RF-adjacent attacker to cause an affected device to restart unexpectedly, resulting in a denial of service (DoS) condition. The vulnerability is due to incomplete input validation of ANQP query frames by the affected device. An attacker could exploit this vulnerability by sending a malformed ANQP query frame to an affected device that is on an RF-adjacent network. A successful exploit could allow the attacker to cause the affected device to restart unexpectedly, resulting in a DoS condition. This vulnerability affects Cisco Wireless LAN Controllers that are running a vulnerable release of Cisco WLC Software and are configured to support Hotspot 2.0. Cisco Bug IDs: CSCve05779.

CWE : Common Weakness Enumeration

%idName
26% (17) CWE-20 Improper Input Validation
23% (15) CWE-399 Resource Management Errors
14% (9) CWE-264 Permissions, Privileges, and Access Controls
6% (4) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
4% (3) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
3% (2) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
3% (2) CWE-352 Cross-Site Request Forgery (CSRF)
3% (2) CWE-287 Improper Authentication
3% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
1% (1) CWE-787 Out-of-bounds Write
1% (1) CWE-772 Missing Release of Resource after Effective Lifetime
1% (1) CWE-755 Improper Handling of Exceptional Conditions
1% (1) CWE-362 Race Condition
1% (1) CWE-269 Improper Privilege Management
1% (1) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
1% (1) CWE-77 Improper Sanitization of Special Elements used in a Command ('Comma...

Open Source Vulnerability Database (OSVDB)

id Description
72616 Cisco Wireless LAN Controller (WLC) Crafted ICMP Packet Sequence Remote DoS
67925 Cisco WLC Unspecified ACL Bypass (2010-0575)
67924 Cisco WLC Unspecified ACL Bypass (2010-3034)
67923 Cisco WLC Unspecified Privilege Escalation (2010-3033)
67922 Cisco WLC Unspecified Privilege Escalation (2010-2843)
67921 Cisco WLC Unspecified Privilege Escalation (2010-2842)
67920 Cisco WLC Unspecified HTTP Packet Handling Remote DoS
67919 Cisco WLC Unspecified IKE Packet Handling Remote DoS
52375 Cisco Multiple Wireless Products Unspecified Local Privilege Escalation
52374 Cisco Multiple Wireless Products Malformed IP Packet Processing Remote DoS
52373 Cisco Multiple Wireless Products login.html Malformed POST Request Remote DoS
52372 Cisco Multiple Wireless Products w/ Webauth Vulnerability Scan Remote DoS
36661 Cisco Multiple Products Wireless LAN Controller (WLC) Broadcast ARP Storm Rem...
36660 Cisco Multiple Products Wireless LAN Controller (WLC) Crafted Unicast ARP Req...
34139 Cisco Wireless LAN Controller (WLC) Network Processing Unit (NPU) Malformed H...
34137 Cisco Wireless LAN Controller (WLC) Network Processing Unit (NPU) Malformed 8...
34135 Cisco Wireless LAN Controller (WLC) Malformed Ethernet Traffic DoS
34134 Cisco Wireless LAN Controller (WLC) Default Community/Private SNMP Strings
34133 Cisco Aironet Lightweight Access Points Persistent Admin Password

ExploitDB Exploits

id Description
23361 Cisco Wireless Lan Controller 7.2.110.0 Multiple Vulnerabilities
21523 Cisco DPC2100 Denial of Service

Information Assurance Vulnerability Management (IAVM)

id Description
2014-A-0036 Multiple Security Vulnerabilities in Cisco Wireless LAN Controller
Severity: Category I - VMSKEY: V0046173
2013-A-0022 Multiple Security Vulnerabilities in Cisco Wireless LAN Controller
Severity: Category I - VMSKEY: V0036642

Snort® IPS/IDS

Date Description
2020-12-05 Cisco Wireless LAN Controller denial of service attempt
RuleID : 52126 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco Wireless LAN Controller IAPP message denial of service attempt
RuleID : 49879 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco Wireless LAN Controller denial of service attempt
RuleID : 49867 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco Wireless LAN Controller denial of service attempt
RuleID : 49866 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco Wireless LAN Controller cross site request forgery attempt
RuleID : 49859 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco Wireless LAN Controller CAPWAP information disclosure attempt
RuleID : 48204 - Type : SERVER-OTHER - Revision : 4
2020-12-05 Cisco Wireless LAN Controller CAPWAP denial of service attempt
RuleID : 48201 - Type : SERVER-OTHER - Revision : 1
2017-11-02 Cisco Wireless LAN Controller cldcClientTable OID memory leak attempt
RuleID : 44727 - Type : PROTOCOL-SNMP - Revision : 1
2017-11-02 Cisco Wireless LAN Controller cldcClientStatisticTable OID memory leak attempt
RuleID : 44726 - Type : PROTOCOL-SNMP - Revision : 1
2017-11-02 Cisco Wireless LAN Controller clExtApDot11IfTable OID memory leak attempt
RuleID : 44725 - Type : PROTOCOL-SNMP - Revision : 2
2017-04-06 Cisco Wireless LAN Controller denial of service attempt
RuleID : 42139 - Type : SERVER-WEBAPP - Revision : 1

Nessus® Vulnerability Scanner

id Description
2018-10-26 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20181017-wlc-capwap-memory-leak.nasl - Type: ACT_GATHER_INFO
2018-05-11 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180502-wlc-mfdos.nasl - Type: ACT_GATHER_INFO
2017-11-08 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20171101-wireless_lan_controller_wlc1_wlc2_wcl4.nasl - Type: ACT_GATHER_INFO
2017-11-08 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20171101-wlc3-wireless_lan_controller.nasl - Type: ACT_GATHER_INFO
2017-04-19 Name: The remote device is missing vendor-supplied security patches.
File: cisco-sa-20170405-wlc1.nasl - Type: ACT_GATHER_INFO
2017-04-19 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170405-wlc2.nasl - Type: ACT_GATHER_INFO
2016-10-18 Name: The remote device is missing vendor-supplied security patches.
File: cisco-sa-20160831-wlc.nasl - Type: ACT_GATHER_INFO
2016-05-04 Name: The remote device is missing vendor-supplied security patches.
File: cisco-sa-20160420-htrd-bdos-wlc.nasl - Type: ACT_GATHER_INFO
2016-01-22 Name: The remote device is missing a vendor-supplied security update.
File: cisco-sa-20151016-wlc.nasl - Type: ACT_GATHER_INFO
2015-05-21 Name: The remote device is missing a vendor-supplied security update.
File: cisco-CSCum03269-wlc.nasl - Type: ACT_GATHER_INFO
2014-03-14 Name: The remote device is missing a vendor-supplied security update.
File: cisco-sa-20140305-wlc.nasl - Type: ACT_GATHER_INFO
2013-09-25 Name: The remote device is missing a vendor-supplied security update.
File: cisco-sa-20130123-wlc.nasl - Type: ACT_GATHER_INFO