Cisco Wireless LAN Controller Multiple DoS

high Nessus Plugin ID 99472

Synopsis

The remote device is missing vendor-supplied security patches.

Description

According to its self-reported version, the Cisco Wireless LAN Controller (WLC) software running on the remote device is affected by multiple denial of service vulnerabilities :

- A denial of service vulnerability exists in the RADIUS Change of Authorization (CoA) request processing due to improper validation of the RADIUS CoA packet header. An unauthenticated, remote attacker can exploit this, via a specially crafted RADIUS CoA packet, to disconnect connections through the WLC. (CVE-2016-9195)

- A denial of service vulnerability exists in the web management interface due to a missing internal handler for a specific request. An unauthenticated, remote attacker can exploit this, by accessing a hidden URL on the web management interface, to cause the device to reload. (CVE-2017-3832)

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvb01835 and CSCvb48198.

See Also

http://www.nessus.org/u?a98ac301

http://www.nessus.org/u?1bc8cd49

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvb01835

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvb48198

Plugin Details

Severity: High

ID: 99472

File Name: cisco-sa-20170405-wlc1.nasl

Version: 1.6

Type: combined

Family: CISCO

Published: 4/19/2017

Updated: 8/20/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:cisco:wireless_lan_controller, cpe:/o:cisco:wireless_lan_controller_firmware

Required KB Items: Host/Cisco/WLC/Version, Host/Cisco/WLC/Port

Exploit Ease: No known exploits are available

Patch Publication Date: 4/5/2017

Vulnerability Publication Date: 4/5/2017

Reference Information

CVE: CVE-2016-9195, CVE-2017-3832

BID: 97421, 97425