A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol of the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
The vulnerability is due to insufficient data packet validation. An attacker could exploit this vulnerability by sending a crafted CAPWAP packet to the Cisco WLC.
Cisco has confirmed the vulnerability in a security notice; however, software updates are not available.
To exploit this vulnerability, the attacker may need access to trusted, internal networks in which the targeted device may reside to send crafted CAPWAP packets to the device. This access requirement may reduce the likelihood of a successful exploit.