Lucene search

K
ciscoCiscoCISCO-SA-20150921-CVE-2015-6302
HistorySep 21, 2015 - 3:09 p.m.

Cisco Wireless LAN Controller RADIUS Packet of Disconnect Vulnerability

2015-09-2115:09:06
tools.cisco.com
7

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

48.6%

A vulnerability in the RADIUS implementation of the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition by disconnecting user sessions.

The vulnerability is due to a lack of proper input validation of the RADIUS Disconnect-Request packet. An attacker could exploit this vulnerability by sending crafted RADIUS UDP Disconnect-Request packets to the affected device. An exploit could allow the attacker to cause a partial DoS condition due to the disconnect of random user sessions.

Cisco has confirmed the vulnerability; however, software updates are not available.

To exploit this vulnerability, the attacker must send crafted RADIUS Disconnect-Request packets to the targeted system, making exploitation more difficult in environments that restrict network access from untrusted sources.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Cisco would like to thank security researcher Casper Joost Eyckelhof from Quarantainenet BV for reporting this vulnerability.

Affected configurations

Vulners
Node
ciscowireless_lan_controller_7.4Match7.0
OR
ciscowireless_lan_controller_7.4Match7.0.250.0
OR
ciscowireless_lan_controller_7.4Match7.0.252.0

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.001 Low

EPSS

Percentile

48.6%

Related for CISCO-SA-20150921-CVE-2015-6302