Cisco Wireless LAN Controller Multiple Vulnerabilities

high Nessus Plugin ID 118461

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, the Cisco Wireless LAN Controller (WLC) is affected by the following vulnerabilities:

- A privilege escalation vulnerability due to improper parsing of a specific TACACS attribute. A remote attacker, authenticating to TACACs via the GUI, could create a local account with administrative privileges. (CVE-2018-0417)

- A denial of service vulnerability due to flaws with specific timer mechanisms. A remote attacker could potentially cause the timer to crash resulting in a DoS condition.
(CVE-2018-0441)

- An information disclosure vulnerability due to insufficient checks when handling Control and Provisioning of Wireless Access Point keepalive requests. A remote attacker, with a specially crafted CAPWAP keepalive packet, could potentially read the devices memory. (CVE-2018-0442)

- A denial of service vulnerability due to improper validation of CAPWAP discovery request packets. A remote attacker could potentially disconnect associated APs, resulting in a DoS condition. (CVE-2018-0443)

Please see the included Cisco BIDs and the Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID(s) CSCvf66680, CSCvh65876, CSCve64652, and CSCvf66696.

See Also

http://www.nessus.org/u?5e14b610

http://www.nessus.org/u?4d106cd6

http://www.nessus.org/u?e4eb02b4

http://www.nessus.org/u?c9605ddd

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf66680

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf66696

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh65876

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCve64652

Plugin Details

Severity: High

ID: 118461

File Name: cisco-sa-20181017-wlc-capwap-memory-leak.nasl

Version: 1.12

Type: combined

Family: CISCO

Published: 10/26/2018

Updated: 7/29/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2018-0442

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2018-0417

Vulnerability Information

Required KB Items: Host/Cisco/WLC/Version, Host/Cisco/WLC/Port

Exploit Ease: No known exploits are available

Patch Publication Date: 10/17/2018

Vulnerability Publication Date: 10/17/2018

Reference Information

CVE: CVE-2018-0417, CVE-2018-0441, CVE-2018-0442, CVE-2018-0443

BID: 105664, 105667, 105680, 105686