Vulnslist

find the latest Cisco vulnerabilities

Cisco Wireless LAN Controller IPv6 Packet Handling Denial of Service Vulnerability

Cisco-SA-20150623-CVE-2015-4215 · Medium · Published · Updated

A vulnerability in Cisco Wireless LAN Controller (WLC) devices could allow an unauthenticated, adjacent attacker could to cause a crash of an affected device. The vulnerability exists due to an unhandled exception that may occur when IPv6 traffic is forwarded to a device that is not configured for IPv6. An attacker could exploit this vulnerability by sending a certain class of IPv6 traffic to an affected device. Cisco has confirmed the vulnerability and released software updates. To exploit this vulnerability, an attacker must be on the same broadcast or collision domain as the targeted device. This access requirement reduces the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to monitor affected systems.

CVEsCVE-2015-4215
Cisco Bug IDsCSCuj01046
CVSS ScoreBase 6.1
Base 6.1 AV:A/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
Product Names From Source
Cisco Wireless LAN Controller (WLC) 7.5.102.0, Cisco Wireless LAN Controller (WLC) 7.6.1.62, Cisco Wireless LAN Controller (WLC)

CSAF Product Statuses

Product Status Source CVE Rows
7.5.102.0 known_affected cisco_csaf CVE-2015-4215 1
7.6.1.62 known_affected cisco_csaf CVE-2015-4215 1

Related Products

Product CVE Evidence
Cisco Wireless LAN Controller (WLC) CVE-2015-4215 Cisco OpenVuln