Vulnslist

find the latest Cisco vulnerabilities

Cisco Wireless LAN Controller RADIUS Change of Authorization Denial of Service Vulnerability

cisco-sa-20170405-wlc1 · Medium · Published · Updated

A vulnerability in RADIUS Change of Authorization (CoA) request processing in the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition by disconnecting a single connection. The vulnerability is due to lack of proper input validation of the RADIUS CoA packet header. An attacker could exploit this vulnerability by sending a crafted RADIUS CoA packet to a targeted device. A successful exploit could allow the attacker to disconnect a connection through the WLC unexpectedly. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-wlc1

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2016-9195
Cisco Bug IDsCSCvb01835
CVSS ScoreBase 5.8
Base 5.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L/E:X/RL:X/RC:X
Product Names From Source
Cisco Wireless LAN Controller (WLC) 8.3.102.0, Cisco Wireless LAN Controller (WLC)

Related Products

Product CVE Evidence
Cisco RV Series Routers CVE-2016-9195 Cisco OpenVuln
Cisco Nexus Dashboard CVE-2016-9195 Cisco OpenVuln
Cisco Wireless LAN Controller (WLC) CVE-2016-9195 Cisco OpenVuln