6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.002 Low
EPSS
Percentile
53.9%
Cisco Wireless LAN Controller (WLC) Software contains a vulnerability that could allow an unauthenticated, remote attacker to conduct cross-site request forgery attacks on a targeted system.
The vulnerability is due to insufficient sanitization of user-supplied input processed by the WLC management web interface of the affected software. An unauthenticated, remote attacker could exploit this vulnerability by convincing a targeted user to follow a malicious link. Successful exploitation could allow the attacker to gain unauthorized access to the affected application, which could be used to conduct further attacks.
Cisco confirmed the vulnerability in a security bug report; however, software updates are not available.
To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the provided link.
Cisco would like to thank security researcher Jacob Holcomb for reporting this vulnerability.