Lucene search

K
ciscoCiscoCISCO-SA-20170405-WLC1
HistoryApr 05, 2017 - 4:00 p.m.

Cisco Wireless LAN Controller RADIUS Change of Authorization Denial of Service Vulnerability

2017-04-0516:00:00
tools.cisco.com
13

0.002 Low

EPSS

Percentile

60.3%

A vulnerability in RADIUS Change of Authorization (CoA) request processing in the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition by disconnecting a single connection.

The vulnerability is due to lack of proper input validation of the RADIUS CoA packet header. An attacker could exploit this vulnerability by sending a crafted RADIUS CoA packet to a targeted device. A successful exploit could allow the attacker to disconnect a connection through the WLC unexpectedly.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-wlc1 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-wlc1”]

Affected configurations

Vulners
Node
ciscowireless_lan_controllerMatch8.3
OR
ciscowireless_lan_controllerMatch8.3.102.0

0.002 Low

EPSS

Percentile

60.3%

Related for CISCO-SA-20170405-WLC1