CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:A/AC:L/Au:N/C:N/I:N/A:C
EPSS
Percentile
44.7%
A vulnerability in the wireless web authentication subsystem of Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.
The vulnerability exists due to improper input sanitization of a certain value that is supplied by a user prior to successfully authenticating to an affected device. An attacker could exploit this vulnerability by sending a request designed to trigger the vulnerability and cause a process crash that will trigger a restart of the device, resulting in a DoS condition.
Cisco has confirmed the vulnerability and released software updates.
To exploit this vulnerability, an attacker must have access to the same broadcast or collision domain as the targeted device. This access requirement decreases the likelihood of a successful exploit.
Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | wireless_lan_controller | 7.5 | cpe:2.3:h:cisco:wireless_lan_controller:7.5:*:*:*:*:*:*:* |
cisco | wireless_lan_controller | 7.6 | cpe:2.3:h:cisco:wireless_lan_controller:7.6:*:*:*:*:*:*:* |
cisco | wireless_lan_controller | 7.5.102.0 | cpe:2.3:h:cisco:wireless_lan_controller:7.5.102.0:*:*:*:*:*:*:* |
cisco | wireless_lan_controller | 7.5.102.11 | cpe:2.3:h:cisco:wireless_lan_controller:7.5.102.11:*:*:*:*:*:*:* |
cisco | wireless_lan_controller | 7.6.100.0 | cpe:2.3:h:cisco:wireless_lan_controller:7.6.100.0:*:*:*:*:*:*:* |