Executive Summary

Summary
Title Cisco Wireless LAN Controller Management GUI Denial of Service Vulnerability
Informations
Name cisco-sa-20170405-wlc3 First vendor Publication 2017-04-05
Vendor Cisco Last vendor Modification 2017-04-05
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 7.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in the web management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

The vulnerability is due to a missing internal handler for the specific request. An attacker could exploit this vulnerability by accessing a specific hidden URL on the web management interface. A successful exploit could allow the attacker to cause a reload of the device, resulting in a DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-wlc3 ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-wlc3"]

BEGIN PGP SIGNATURE

iQKBBAEBAgBrBQJY5RUBZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHmzBw//XFeVmnZYBr43cDNl On+2wDW8lPUqj4F8fzcxPJL1OjrcfQNstxbFaKRbQM34QpHzQ0mEArW2V9ATBVnW pBCN8NbhKe/5GTc388kmd3FyXkwfhxej7YVjBx12WToLERlWd0wivdK6gQu0WDQN M9wJFnZP5iUEfsmCqr5f8lxYxqI0YKfgzYUTEynqdUR5o+qyQGZzYrW6b93vDcoB hlt51sDiqDysRirBP4qHHJp0qPEq6qHIdE3Gv4EELEs2zfon03rCUHOGQ50MAy53 iBMRu9xUqUlDWm8ihfkrs8ADzHetLuBl/cXv9mMuSke2Joii1eiSqTxYmj5E0XRl 2PKy3P8fPUc1VaOun1/jGuxIarVSZXEdjDReRRKDGNSLSyev0mwDplyKFYq/cKCS bYFPkYMzcdvD00P286krWPnDwd9OfYyOxdScahi27cg9crNmKsqVfHf8ZgO/R3kl eZoONLDalLO/FLLqQYjPuMsV8IT3RvCgUvQNZk019/V28p3rfx5DaZc50b2YJP9N 7jyg1dcdEg8B6CfHdd5a9SRWZbpOnJKqO2t5KV9ThPqFmBNZwqxgyO5TFUmqJo+V wMtFOQkJ/Tb7W8uaAEngUxCOkbuqi1FI7CBbtkc7OmpZbYo8/v6ysw8dwDGslSFy FpuNd3aUdREzb4t0b7P92HOHDdw= =6aS4 END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-755 Improper Handling of Exceptional Conditions

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 1

Snort® IPS/IDS

Date Description
2017-04-06 Cisco Wireless LAN Controller denial of service attempt
RuleID : 42139 - Revision : 1 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2017-04-19 Name : The remote device is missing vendor-supplied security patches.
File : cisco-sa-20170405-wlc1.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
3
Date Informations
2017-04-20 13:24:14
  • Multiple Updates
2017-04-13 00:21:04
  • Multiple Updates
2017-04-07 00:24:30
  • Multiple Updates
2017-04-05 21:18:18
  • First insertion