Vulnslist

find the latest Cisco vulnerabilities

Cisco Wireless LAN Controller Management Interface Denial of Service Vulnerability

cisco-sa-20160420-wlc · High · Published · Updated

A vulnerability in the web-based management interface of Cisco Wireless LAN Controller (WLC) devices running Cisco AireOS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the presence of unsupported URLs in the web-based device management interface provided by the affected software. An attacker could exploit this vulnerability by attempting to access a URL that is not generally accessible from and supported by the management interface. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There is a workaround that addresses this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-wlc

Workarounds

Customers may protect an affected device from exploitation by implementing a CPU access control list (ACL) on the management interface of the device.

CVEsCVE-2016-1362
Cisco Bug IDsCSCun86747
CVSS ScoreBase 7.8
Base 7.8 AV:N/AC:L/Au:N/C:N/I:N/A:C/E:F/RL:OF/RC:C
Product Names From Source
Cisco 5500 Series Wireless Controllers

Related Products

Product CVE Evidence
Cisco RV Series Routers CVE-2016-1362 Cisco OpenVuln
Cisco Nexus Dashboard CVE-2016-1362 Cisco OpenVuln
Cisco 5500 Series Wireless Controllers CVE-2016-1362 Cisco OpenVuln