Vulnerabilites related to cisco - 5508_wireless_controller
Vulnerability from fkie_nvd
Published
2012-03-01 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cisco Wireless LAN Controller (WLC) devices with software 6.0 and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (device reload) via a sequence of IPv6 packets, aka Bug ID CSCtt07949.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "593615BB-EDEC-4267-9D6A-B67E89BB0BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.182.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F555475A-7ED8-45DD-93C5-BC3BFA07851B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.188.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAA820A1-1E44-43E5-B80A-446608697558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.196.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "983D3154-58C0-4994-AFD3-FCCCE607E66C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.199.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E87542-257E-4C75-87DB-CD56416F7524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.199.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6862C9D-2683-4BDC-B78E-537785F291C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B84AFFD-117A-4E7C-8F2C-01DF5DE4EDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0.98.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1855D021-7914-4862-B613-97F6664AE33F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D96188C-F969-46A4-9600-D64FB8123031",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "41B7499D-75A9-46A9-9129-BCD18533B21F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:2000_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6A979-5487-4ABF-AD66-522442D6DC38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2100_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B6D315-BBA5-4C37-BB74-BD1ADCA77F69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2106_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7208F675-6E28-4DE3-8E08-132DE2AB95C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2112_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB736F8-6A4E-42BE-9BAE-EE53E4E933E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2125_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F2B4FCC-1E65-4F49-BA1E-82DEAD5959D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2500_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "719ECA81-592C-4118-B1CB-2AF604461DED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2504_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "064D7DAD-CFC5-4433-AE45-671FB4357D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4100_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "97790CF3-F428-499C-A175-1DB8380432F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4400_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62DD77D6-9809-4B8B-A19F-1D10449C546F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4402_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E98007A4-43AC-40F6-9032-BB83B33B6E7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4404_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "883A22D1-2529-49BB-92A4-0CE2C1F327C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:5508_wireless_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AC836E1-650B-4D2A-A085-9DB574A3F060",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Wireless LAN Controller (WLC) devices with software 6.0 and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (device reload) via a sequence of IPv6 packets, aka Bug ID CSCtt07949."
    },
    {
      "lang": "es",
      "value": "Dispositivos Cisco Wireless LAN Controller (WLC) con software v6.0 y v7.0 anteriores a v7.0.220.0, 7.1 anteriores a v7.1.91.0, y v7.2 anteriores a v7.2.103.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de una secuencia de paquetes IPv6, tambi\u00e9n conocido como Bug ID CSCtt07949."
    }
  ],
  "id": "CVE-2012-0369",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-01T01:55:01.143",
  "references": [
    {
      "source": "psirt@cisco.com",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-01 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0 and 7.1 before 7.1.91.0, when WebAuth is enabled, allow remote attackers to cause a denial of service (device reload) via a sequence of (1) HTTP or (2) HTTPS packets, aka Bug ID CSCtt47435.
Impacted products
Vendor Product Version
cisco wireless_lan_controller_software 4.0
cisco wireless_lan_controller_software 4.0.108
cisco wireless_lan_controller_software 4.0.155.0
cisco wireless_lan_controller_software 4.0.155.5
cisco wireless_lan_controller_software 4.0.179.8
cisco wireless_lan_controller_software 4.0.179.11
cisco wireless_lan_controller_software 4.0.196
cisco wireless_lan_controller_software 4.0.206.0
cisco wireless_lan_controller_software 4.0.217.0
cisco wireless_lan_controller_software 4.0.219.0
cisco wireless_lan_controller_software 4.1
cisco wireless_lan_controller_software 4.1.171.0
cisco wireless_lan_controller_software 4.1.181.0
cisco wireless_lan_controller_software 4.1.185.0
cisco wireless_lan_controller_software 4.1m
cisco wireless_lan_controller_software 4.2
cisco wireless_lan_controller_software 4.2.61.0
cisco wireless_lan_controller_software 4.2.99.0
cisco wireless_lan_controller_software 4.2.112.0
cisco wireless_lan_controller_software 4.2.117.0
cisco wireless_lan_controller_software 4.2.130.0
cisco wireless_lan_controller_software 4.2.173.0
cisco wireless_lan_controller_software 4.2.174.0
cisco wireless_lan_controller_software 4.2.176.0
cisco wireless_lan_controller_software 4.2.182.0
cisco wireless_lan_controller_software 4.2m
cisco wireless_lan_controller_software 5.0
cisco wireless_lan_controller_software 5.0.148.0
cisco wireless_lan_controller_software 5.0.148.2
cisco wireless_lan_controller_software 5.1
cisco wireless_lan_controller_software 5.1.151.0
cisco wireless_lan_controller_software 5.1.152.0
cisco wireless_lan_controller_software 5.1.160.0
cisco wireless_lan_controller_software 5.2
cisco wireless_lan_controller_software 5.2.157.0
cisco wireless_lan_controller_software 5.2.169.0
cisco wireless_lan_controller_software 6.0
cisco wireless_lan_controller_software 6.0.182.0
cisco wireless_lan_controller_software 6.0.188.0
cisco wireless_lan_controller_software 6.0.196.0
cisco wireless_lan_controller_software 6.0.199.0
cisco wireless_lan_controller_software 6.0.199.4
cisco wireless_lan_controller_software 7.0
cisco wireless_lan_controller_software 7.0.98.0
cisco wireless_lan_controller_software 7.1
cisco wireless_lan_controller_software 7.2
cisco 2000_wireless_lan_controller *
cisco 2100_wireless_lan_controller *
cisco 2106_wireless_lan_controller *
cisco 2112_wireless_lan_controller *
cisco 2125_wireless_lan_controller *
cisco 2500_wireless_lan_controller *
cisco 2504_wireless_lan_controller *
cisco 4100_wireless_lan_controller *
cisco 4400_wireless_lan_controller *
cisco 4402_wireless_lan_controller *
cisco 4404_wireless_lan_controller *
cisco 5508_wireless_controller *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44884968-081D-4F6B-A325-74D5466052A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.108:*:*:*:*:*:*:*",
              "matchCriteriaId": "E23E6B23-2DFC-4959-B69D-35B12A3674C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F9E44A7-9C79-4937-B929-D7CD48969D44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D91822EB-04F3-4590-9E74-C173D332FF64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "328B192D-6070-46C9-9B5E-E2D19197516E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEB928B-97EC-490F-A313-B565FB67C8D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.196:*:*:*:*:*:*:*",
              "matchCriteriaId": "27C3E9DF-439E-4319-BFA3-14D756069FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.206.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "546C8A02-3C19-4AE8-98D6-D24342306764",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.217.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D882A253-143C-4561-B0CA-209D48A995F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.219.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AA48A99-0ED5-4FEB-8906-B68D4C5C702E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F3A8DBB-9E82-4428-9034-391F662DFA0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.171.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "81CC513E-95EA-4FA0-AD70-25C51155AD26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.181.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "272C20B5-3EA4-4AFD-ACD6-15A8ABA73C83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.185.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "11F235E4-673A-4EC4-98F6-423C68919AB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1m:*:*:*:*:*:*:*",
              "matchCriteriaId": "7701D5E7-9264-4A34-9467-9AB3CA5E4A8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC1E1F40-ECB6-42FB-838E-998B1893D5CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.61.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A15A3CA-69E7-451D-AB84-43A6BBF17A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.99.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "62424F6A-2D82-45C0-A7D3-540649DA5F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.112.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A17769C-A301-4BC9-A2B1-E442F78030C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.117.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2290101-AEFA-4C4F-B8CE-620BDE6EA3F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.130.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0947448E-D8C5-423D-BDF3-36BD29A83ABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "57C6B8CB-9277-463B-84EB-AEF36EE40E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.174.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDBD9C2D-514C-44D3-ADCD-D6F80E50BEF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.176.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A97D98B-6B3C-4AD1-8096-202E44F63B72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.182.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C29D759-F433-42FB-ADA5-8FEA71085CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2m:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD3F13F4-0E96-490D-9DA0-8B22595E9BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DA75092-5306-45F5-AEB5-67A2224FFDCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BAACE0C-DD44-4E81-ABEF-7896647CE8C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5140A4F1-713E-4478-B807-83D826DAA374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "68625A20-073A-4AC9-8C46-BCE07B185D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.151.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2143731F-749D-45ED-B2FE-A3893C5B1F6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.152.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C860DDD-33C6-4CC9-B8D2-4E3C9884C445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.160.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2230FF3-EE71-408A-B558-74AAD024F661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1511CA9-B471-49D6-9BEE-1BADE6EC61E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.157.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D513E4D8-B0A4-4C71-AD42-8EF9FE3E63B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.169.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A2DB28-C42F-4E64-B0A2-63D83603D656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "593615BB-EDEC-4267-9D6A-B67E89BB0BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.182.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F555475A-7ED8-45DD-93C5-BC3BFA07851B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.188.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAA820A1-1E44-43E5-B80A-446608697558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.196.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "983D3154-58C0-4994-AFD3-FCCCE607E66C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.199.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E87542-257E-4C75-87DB-CD56416F7524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.199.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6862C9D-2683-4BDC-B78E-537785F291C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B84AFFD-117A-4E7C-8F2C-01DF5DE4EDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0.98.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1855D021-7914-4862-B613-97F6664AE33F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D96188C-F969-46A4-9600-D64FB8123031",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "41B7499D-75A9-46A9-9129-BCD18533B21F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:2000_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6A979-5487-4ABF-AD66-522442D6DC38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2100_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B6D315-BBA5-4C37-BB74-BD1ADCA77F69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2106_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7208F675-6E28-4DE3-8E08-132DE2AB95C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2112_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB736F8-6A4E-42BE-9BAE-EE53E4E933E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2125_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F2B4FCC-1E65-4F49-BA1E-82DEAD5959D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2500_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "719ECA81-592C-4118-B1CB-2AF604461DED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2504_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "064D7DAD-CFC5-4433-AE45-671FB4357D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4100_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "97790CF3-F428-499C-A175-1DB8380432F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4400_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62DD77D6-9809-4B8B-A19F-1D10449C546F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4402_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E98007A4-43AC-40F6-9032-BB83B33B6E7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4404_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "883A22D1-2529-49BB-92A4-0CE2C1F327C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:5508_wireless_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AC836E1-650B-4D2A-A085-9DB574A3F060",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0 and 7.1 before 7.1.91.0, when WebAuth is enabled, allow remote attackers to cause a denial of service (device reload) via a sequence of (1) HTTP or (2) HTTPS packets, aka Bug ID CSCtt47435."
    },
    {
      "lang": "es",
      "value": "Dispositivos Cisco Wireless LAN Controller (WLC) con software 4v.x, v5.x, v6.0, y v7.0 anteriores a v7.0.220.0 y 7.1 anteriores a v7.1.91.0, cuando est\u00e1 activado WebAuth, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga de dispositivo) a trav\u00e9s de una secuencia de paquetes (1) HTTP o (2) HTTPS, tambi\u00e9n conocido como Bug ID CSCtt47435."
    }
  ],
  "id": "CVE-2012-0370",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-01T01:55:01.173",
  "references": [
    {
      "source": "psirt@cisco.com",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-01 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
The administrative management interface on Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allows remote attackers to cause a denial of service (device crash) via a malformed URL in an HTTP request, aka Bug ID CSCts81997.
Impacted products
Vendor Product Version
cisco wireless_lan_controller_software 4.0
cisco wireless_lan_controller_software 4.0.108
cisco wireless_lan_controller_software 4.0.155.0
cisco wireless_lan_controller_software 4.0.155.5
cisco wireless_lan_controller_software 4.0.179.8
cisco wireless_lan_controller_software 4.0.179.11
cisco wireless_lan_controller_software 4.0.196
cisco wireless_lan_controller_software 4.0.206.0
cisco wireless_lan_controller_software 4.0.217.0
cisco wireless_lan_controller_software 4.0.219.0
cisco wireless_lan_controller_software 4.1
cisco wireless_lan_controller_software 4.1.171.0
cisco wireless_lan_controller_software 4.1.181.0
cisco wireless_lan_controller_software 4.1.185.0
cisco wireless_lan_controller_software 4.1m
cisco wireless_lan_controller_software 4.2
cisco wireless_lan_controller_software 4.2.61.0
cisco wireless_lan_controller_software 4.2.99.0
cisco wireless_lan_controller_software 4.2.112.0
cisco wireless_lan_controller_software 4.2.117.0
cisco wireless_lan_controller_software 4.2.130.0
cisco wireless_lan_controller_software 4.2.173.0
cisco wireless_lan_controller_software 4.2.174.0
cisco wireless_lan_controller_software 4.2.176.0
cisco wireless_lan_controller_software 4.2.182.0
cisco wireless_lan_controller_software 4.2m
cisco wireless_lan_controller_software 5.0
cisco wireless_lan_controller_software 5.0.148.0
cisco wireless_lan_controller_software 5.0.148.2
cisco wireless_lan_controller_software 5.1
cisco wireless_lan_controller_software 5.1.151.0
cisco wireless_lan_controller_software 5.1.152.0
cisco wireless_lan_controller_software 5.1.160.0
cisco wireless_lan_controller_software 5.2
cisco wireless_lan_controller_software 5.2.157.0
cisco wireless_lan_controller_software 5.2.169.0
cisco wireless_lan_controller_software 6.0
cisco wireless_lan_controller_software 6.0.182.0
cisco wireless_lan_controller_software 6.0.188.0
cisco wireless_lan_controller_software 6.0.196.0
cisco wireless_lan_controller_software 6.0.199.0
cisco wireless_lan_controller_software 6.0.199.4
cisco wireless_lan_controller_software 7.0
cisco wireless_lan_controller_software 7.0.98.0
cisco wireless_lan_controller_software 7.1
cisco wireless_lan_controller_software 7.2
cisco 2000_wireless_lan_controller -
cisco 2100_wireless_lan_controller -
cisco 2106_wireless_lan_controller -
cisco 2112_wireless_lan_controller -
cisco 2125_wireless_lan_controller -
cisco 2500_wireless_lan_controller -
cisco 2504_wireless_lan_controller -
cisco 4100_wireless_lan_controller -
cisco 4400_wireless_lan_controller -
cisco 4402_wireless_lan_controller -
cisco 4404_wireless_lan_controller -
cisco 5508_wireless_controller -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44884968-081D-4F6B-A325-74D5466052A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.108:*:*:*:*:*:*:*",
              "matchCriteriaId": "E23E6B23-2DFC-4959-B69D-35B12A3674C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F9E44A7-9C79-4937-B929-D7CD48969D44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D91822EB-04F3-4590-9E74-C173D332FF64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "328B192D-6070-46C9-9B5E-E2D19197516E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEB928B-97EC-490F-A313-B565FB67C8D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.196:*:*:*:*:*:*:*",
              "matchCriteriaId": "27C3E9DF-439E-4319-BFA3-14D756069FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.206.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "546C8A02-3C19-4AE8-98D6-D24342306764",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.217.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D882A253-143C-4561-B0CA-209D48A995F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.219.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AA48A99-0ED5-4FEB-8906-B68D4C5C702E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F3A8DBB-9E82-4428-9034-391F662DFA0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.171.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "81CC513E-95EA-4FA0-AD70-25C51155AD26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.181.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "272C20B5-3EA4-4AFD-ACD6-15A8ABA73C83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.185.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "11F235E4-673A-4EC4-98F6-423C68919AB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1m:*:*:*:*:*:*:*",
              "matchCriteriaId": "7701D5E7-9264-4A34-9467-9AB3CA5E4A8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC1E1F40-ECB6-42FB-838E-998B1893D5CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.61.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A15A3CA-69E7-451D-AB84-43A6BBF17A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.99.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "62424F6A-2D82-45C0-A7D3-540649DA5F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.112.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A17769C-A301-4BC9-A2B1-E442F78030C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.117.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2290101-AEFA-4C4F-B8CE-620BDE6EA3F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.130.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0947448E-D8C5-423D-BDF3-36BD29A83ABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "57C6B8CB-9277-463B-84EB-AEF36EE40E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.174.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDBD9C2D-514C-44D3-ADCD-D6F80E50BEF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.176.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A97D98B-6B3C-4AD1-8096-202E44F63B72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.182.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C29D759-F433-42FB-ADA5-8FEA71085CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2m:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD3F13F4-0E96-490D-9DA0-8B22595E9BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DA75092-5306-45F5-AEB5-67A2224FFDCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BAACE0C-DD44-4E81-ABEF-7896647CE8C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5140A4F1-713E-4478-B807-83D826DAA374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "68625A20-073A-4AC9-8C46-BCE07B185D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.151.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2143731F-749D-45ED-B2FE-A3893C5B1F6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.152.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C860DDD-33C6-4CC9-B8D2-4E3C9884C445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.160.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2230FF3-EE71-408A-B558-74AAD024F661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1511CA9-B471-49D6-9BEE-1BADE6EC61E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.157.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D513E4D8-B0A4-4C71-AD42-8EF9FE3E63B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.169.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A2DB28-C42F-4E64-B0A2-63D83603D656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "593615BB-EDEC-4267-9D6A-B67E89BB0BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.182.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F555475A-7ED8-45DD-93C5-BC3BFA07851B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.188.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAA820A1-1E44-43E5-B80A-446608697558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.196.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "983D3154-58C0-4994-AFD3-FCCCE607E66C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.199.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E87542-257E-4C75-87DB-CD56416F7524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.199.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6862C9D-2683-4BDC-B78E-537785F291C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B84AFFD-117A-4E7C-8F2C-01DF5DE4EDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0.98.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1855D021-7914-4862-B613-97F6664AE33F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D96188C-F969-46A4-9600-D64FB8123031",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "41B7499D-75A9-46A9-9129-BCD18533B21F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:2000_wireless_lan_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C58CC1B0-7123-4BD9-A05B-7E369B77000D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2100_wireless_lan_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8828AE39-A8E7-43AE-B0C1-3CEB869F54A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2106_wireless_lan_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C58D0FC-9466-46D8-9292-110A502849AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2112_wireless_lan_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A95FD5A-FCC2-42C8-91AD-2F8C823CBFBF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2125_wireless_lan_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "584BBBE4-6E19-47BE-99B6-4370CEA91BF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2500_wireless_lan_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52A0DE1A-D1A2-4F5A-B237-4F53892775E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2504_wireless_lan_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF2B56FF-7F15-4926-A570-472BC675306F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4100_wireless_lan_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F116A191-063F-4768-ABF2-A34AE40D39F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4400_wireless_lan_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E5C6FAD-EE6D-4786-B50D-BE384BAC8852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4402_wireless_lan_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DA92356-F06C-48E3-B476-36A10163F932",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4404_wireless_lan_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C929AEA7-C987-48E5-A494-66D06B665C67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:5508_wireless_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAE0E9A3-9D58-48C4-8383-A2C7095EE40A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The administrative management interface on Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allows remote attackers to cause a denial of service (device crash) via a malformed URL in an HTTP request, aka Bug ID CSCts81997."
    },
    {
      "lang": "es",
      "value": "El interface de gesti\u00f3n administrativa en dispositivos Cisco Wireless LAN Controller (WLC) con software v4.x, v5.x, v6.0, y v7.0 anterior a v7.0.220.0, v7.1 anteriores a v7.1.91.0, y v7.2 anteriores a v7.2.103.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de dispositvo) a trav\u00e9s de una URL manipulada en una petici\u00f3n HTTP, tambi\u00e9n conocido como Bug ID CSCts81997."
    }
  ],
  "id": "CVE-2012-0368",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-01T01:55:01.097",
  "references": [
    {
      "source": "psirt@cisco.com",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-03-01 01:55
Modified
2025-04-11 00:51
Severity ?
Summary
Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.4, when CPU-based ACLs are enabled, allow remote attackers to read or modify the configuration via unspecified vectors, aka Bug ID CSCtu56709.
Impacted products
Vendor Product Version
cisco wireless_lan_controller_software 4.0
cisco wireless_lan_controller_software 4.0.108
cisco wireless_lan_controller_software 4.0.155.0
cisco wireless_lan_controller_software 4.0.155.5
cisco wireless_lan_controller_software 4.0.179.8
cisco wireless_lan_controller_software 4.0.179.11
cisco wireless_lan_controller_software 4.0.196
cisco wireless_lan_controller_software 4.0.206.0
cisco wireless_lan_controller_software 4.0.217.0
cisco wireless_lan_controller_software 4.0.219.0
cisco wireless_lan_controller_software 4.1
cisco wireless_lan_controller_software 4.1.171.0
cisco wireless_lan_controller_software 4.1.181.0
cisco wireless_lan_controller_software 4.1.185.0
cisco wireless_lan_controller_software 4.1m
cisco wireless_lan_controller_software 4.2
cisco wireless_lan_controller_software 4.2.61.0
cisco wireless_lan_controller_software 4.2.99.0
cisco wireless_lan_controller_software 4.2.112.0
cisco wireless_lan_controller_software 4.2.117.0
cisco wireless_lan_controller_software 4.2.130.0
cisco wireless_lan_controller_software 4.2.173.0
cisco wireless_lan_controller_software 4.2.174.0
cisco wireless_lan_controller_software 4.2.176.0
cisco wireless_lan_controller_software 4.2.182.0
cisco wireless_lan_controller_software 4.2m
cisco wireless_lan_controller_software 5.0
cisco wireless_lan_controller_software 5.0.148.0
cisco wireless_lan_controller_software 5.0.148.2
cisco wireless_lan_controller_software 5.1
cisco wireless_lan_controller_software 5.1.151.0
cisco wireless_lan_controller_software 5.1.152.0
cisco wireless_lan_controller_software 5.1.160.0
cisco wireless_lan_controller_software 5.2
cisco wireless_lan_controller_software 5.2.157.0
cisco wireless_lan_controller_software 5.2.169.0
cisco wireless_lan_controller_software 6.0
cisco wireless_lan_controller_software 6.0.182.0
cisco wireless_lan_controller_software 6.0.188.0
cisco wireless_lan_controller_software 6.0.196.0
cisco wireless_lan_controller_software 6.0.199.0
cisco wireless_lan_controller_software 6.0.199.4
cisco wireless_lan_controller_software 7.0
cisco wireless_lan_controller_software 7.0.98.0
cisco 2000_wireless_lan_controller *
cisco 2100_wireless_lan_controller *
cisco 2106_wireless_lan_controller *
cisco 2112_wireless_lan_controller *
cisco 2125_wireless_lan_controller *
cisco 2500_wireless_lan_controller *
cisco 2504_wireless_lan_controller *
cisco 4100_wireless_lan_controller *
cisco 4400_wireless_lan_controller *
cisco 4402_wireless_lan_controller *
cisco 4404_wireless_lan_controller *
cisco 5508_wireless_controller *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "44884968-081D-4F6B-A325-74D5466052A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.108:*:*:*:*:*:*:*",
              "matchCriteriaId": "E23E6B23-2DFC-4959-B69D-35B12A3674C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F9E44A7-9C79-4937-B929-D7CD48969D44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "D91822EB-04F3-4590-9E74-C173D332FF64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "328B192D-6070-46C9-9B5E-E2D19197516E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AEB928B-97EC-490F-A313-B565FB67C8D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.196:*:*:*:*:*:*:*",
              "matchCriteriaId": "27C3E9DF-439E-4319-BFA3-14D756069FFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.206.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "546C8A02-3C19-4AE8-98D6-D24342306764",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.217.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D882A253-143C-4561-B0CA-209D48A995F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.219.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AA48A99-0ED5-4FEB-8906-B68D4C5C702E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F3A8DBB-9E82-4428-9034-391F662DFA0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.171.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "81CC513E-95EA-4FA0-AD70-25C51155AD26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.181.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "272C20B5-3EA4-4AFD-ACD6-15A8ABA73C83",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.185.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "11F235E4-673A-4EC4-98F6-423C68919AB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1m:*:*:*:*:*:*:*",
              "matchCriteriaId": "7701D5E7-9264-4A34-9467-9AB3CA5E4A8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC1E1F40-ECB6-42FB-838E-998B1893D5CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.61.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A15A3CA-69E7-451D-AB84-43A6BBF17A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.99.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "62424F6A-2D82-45C0-A7D3-540649DA5F5C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.112.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A17769C-A301-4BC9-A2B1-E442F78030C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.117.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2290101-AEFA-4C4F-B8CE-620BDE6EA3F7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.130.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0947448E-D8C5-423D-BDF3-36BD29A83ABE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "57C6B8CB-9277-463B-84EB-AEF36EE40E7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.174.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDBD9C2D-514C-44D3-ADCD-D6F80E50BEF9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.176.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A97D98B-6B3C-4AD1-8096-202E44F63B72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.182.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C29D759-F433-42FB-ADA5-8FEA71085CC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2m:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD3F13F4-0E96-490D-9DA0-8B22595E9BC9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DA75092-5306-45F5-AEB5-67A2224FFDCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BAACE0C-DD44-4E81-ABEF-7896647CE8C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5140A4F1-713E-4478-B807-83D826DAA374",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "68625A20-073A-4AC9-8C46-BCE07B185D8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.151.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "2143731F-749D-45ED-B2FE-A3893C5B1F6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.152.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C860DDD-33C6-4CC9-B8D2-4E3C9884C445",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.160.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2230FF3-EE71-408A-B558-74AAD024F661",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1511CA9-B471-49D6-9BEE-1BADE6EC61E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.157.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D513E4D8-B0A4-4C71-AD42-8EF9FE3E63B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.169.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "60A2DB28-C42F-4E64-B0A2-63D83603D656",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "593615BB-EDEC-4267-9D6A-B67E89BB0BD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.182.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "F555475A-7ED8-45DD-93C5-BC3BFA07851B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.188.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAA820A1-1E44-43E5-B80A-446608697558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.196.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "983D3154-58C0-4994-AFD3-FCCCE607E66C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.199.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E87542-257E-4C75-87DB-CD56416F7524",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0.199.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6862C9D-2683-4BDC-B78E-537785F291C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B84AFFD-117A-4E7C-8F2C-01DF5DE4EDA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0.98.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1855D021-7914-4862-B613-97F6664AE33F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:2000_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6A979-5487-4ABF-AD66-522442D6DC38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2100_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B6D315-BBA5-4C37-BB74-BD1ADCA77F69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2106_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7208F675-6E28-4DE3-8E08-132DE2AB95C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2112_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB736F8-6A4E-42BE-9BAE-EE53E4E933E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2125_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F2B4FCC-1E65-4F49-BA1E-82DEAD5959D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2500_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "719ECA81-592C-4118-B1CB-2AF604461DED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:2504_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "064D7DAD-CFC5-4433-AE45-671FB4357D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4100_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "97790CF3-F428-499C-A175-1DB8380432F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4400_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62DD77D6-9809-4B8B-A19F-1D10449C546F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4402_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E98007A4-43AC-40F6-9032-BB83B33B6E7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:4404_wireless_lan_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "883A22D1-2529-49BB-92A4-0CE2C1F327C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:cisco:5508_wireless_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AC836E1-650B-4D2A-A085-9DB574A3F060",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.4, when CPU-based ACLs are enabled, allow remote attackers to read or modify the configuration via unspecified vectors, aka Bug ID CSCtu56709."
    },
    {
      "lang": "es",
      "value": "Dispositivos Cisco Wireless LAN Controller (WLC) son software v4.x, v5.x, v6.0, y 7.0 anteriores a v7.0.220.4, cuando est\u00e1 activada la opci\u00f3n CPU-based ACLs, permite a atacantes remotos leer y modificar la configuraci\u00f3n a trav\u00e9s de vectores no especificados, tambi\u00e9n conocido como Bug ID CSCtu56709."
    }
  ],
  "id": "CVE-2012-0371",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-03-01T01:55:01.220",
  "references": [
    {
      "source": "psirt@cisco.com",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
    },
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-08-10 12:19
Modified
2025-04-11 00:51
Severity ?
Summary
Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 on 5508 series controllers allows remote attackers to cause a denial of service (pbuf exhaustion and device crash) via fragmented traffic, aka Bug ID CSCtd26794.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:unified_wireless_network_solution_software:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3199EF5-5086-4DDE-997F-9F7F15E9BB21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_wireless_network_solution_software:7.0.98.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CFF7663-19E4-4DD8-BCA0-C1B03F630312",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:5508_wireless_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AC836E1-650B-4D2A-A085-9DB574A3F060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 on 5508 series controllers allows remote attackers to cause a denial of service (pbuf exhaustion and device crash) via fragmented traffic, aka Bug ID CSCtd26794."
    },
    {
      "lang": "es",
      "value": "Cisco Unified Wireless Network (UWN) Solution v7.x anterior a v7.0.98.0 en controladores de la serie 5508, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (agotamiento de pbuf y ca\u00edda del dispositivo) a trav\u00e9s de tr\u00e1fico fragmentado, tambi\u00e9n conocido como Bug ID CSCtd26794."
    }
  ],
  "id": "CVE-2010-2980",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-10T12:19:09.957",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-04-15 21:15
Modified
2024-11-21 05:30
Summary
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol handler of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to restart, resulting in a DoS condition.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:5508_wireless_controller_firmware:8.8\\(120.0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "5709E591-8850-4975-85AC-C952F286CA35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:5508_wireless_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAE0E9A3-9D58-48C4-8383-A2C7095EE40A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:5520_wireless_controller_firmware:8.8\\(120.0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B6635B8B-921A-41B1-8008-99BEECD295F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:5520_wireless_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E455D982-A20F-4E69-8702-19D1208D1F0C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol handler of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to restart, resulting in a DoS condition."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en el manejador del protocolo Control and Provisioning of Wireless Access Points (CAPWAP) del Software Cisco Wireless LAN Controller (WLC) podr\u00eda permitir a un atacante no autenticado remoto causar una condici\u00f3n de denegaci\u00f3n de servicio (DoS) sobre un dispositivo afectado. La vulnerabilidad es debido a una comprobaci\u00f3n insuficiente de los paquetes CAPWAP. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete CAPWAP malformado hacia un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante causar que el dispositivo afectado se reinicie, resultando en una condici\u00f3n DoS."
    }
  ],
  "id": "CVE-2020-3262",
  "lastModified": "2024-11-21T05:30:40.903",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-04-15T21:15:36.123",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-capwap-dos-Y2sD9uEw"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-capwap-dos-Y2sD9uEw"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-04-15 21:15
Modified
2024-11-21 05:30
Summary
A vulnerability in the 802.11 Generic Advertisement Service (GAS) frame processing function of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS). The vulnerability is due to incomplete input validation of the 802.11 GAS frames that are processed by an affected device. An attacker could exploit this vulnerability by sending a crafted 802.11 GAS frame over the air to an access point (AP), and that frame would then be relayed to the affected WLC. Also, an attacker with Layer 3 connectivity to the WLC could exploit this vulnerability by sending a malicious 802.11 GAS payload in a Control and Provisioning of Wireless Access Points (CAPWAP) packet to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:5508_wireless_controller_firmware:8.5\\(151.0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "B6D180B4-C80C-4AFD-BF55-BD3F4C0720BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:5508_wireless_controller_firmware:8.10\\(204.92\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "BA4F7F24-17A5-4086-AC2A-28DC93D2D9F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:5508_wireless_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAE0E9A3-9D58-48C4-8383-A2C7095EE40A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:5520_wireless_controller_firmware:8.5\\(151.0\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "D0B52D76-9615-428B-85B8-6991D49934ED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:5520_wireless_controller_firmware:8.10\\(204.92\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "AE3EAF7B-1300-4F64-B86A-106A265072B7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:5520_wireless_controller:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E455D982-A20F-4E69-8702-19D1208D1F0C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A vulnerability in the 802.11 Generic Advertisement Service (GAS) frame processing function of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS). The vulnerability is due to incomplete input validation of the 802.11 GAS frames that are processed by an affected device. An attacker could exploit this vulnerability by sending a crafted 802.11 GAS frame over the air to an access point (AP), and that frame would then be relayed to the affected WLC. Also, an attacker with Layer 3 connectivity to the WLC could exploit this vulnerability by sending a malicious 802.11 GAS payload in a Control and Provisioning of Wireless Access Points (CAPWAP) packet to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad en la funci\u00f3n de procesamiento de trama 802.11 Generic Advertisement Service (GAS) del Software Cisco Wireless LAN Controller (WLC) podr\u00eda permitir a un atacante no autenticado remoto causar la recarga de un dispositivo afectado, resultando en una denegaci\u00f3n de servicio (DoS). La vulnerabilidad es debido a la comprobaci\u00f3n de entrada incompleta de las tramas 802.11 GAS procesadas por un dispositivo afectado. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una trama GAS 802.11 dise\u00f1ada por aire hacia un punto de acceso (AP), y esa trama se transmitir\u00eda al WLC afectado. Adicionalmente, un atacante con conectividad de Capa 3 al WLC podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de una carga maliciosa 802.11 GAS en un paquete Control and Provisioning of Wireless Access Points (CAPWAP) hacia el dispositivo. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo afectado se recargue, resultando en una DoS."
    }
  ],
  "id": "CVE-2020-3273",
  "lastModified": "2024-11-21T05:30:42.057",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.0,
        "source": "psirt@cisco.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-04-15T21:15:36.183",
  "references": [
    {
      "source": "psirt@cisco.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-gas-dos-8FsE3AWH"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-gas-dos-8FsE3AWH"
    }
  ],
  "sourceIdentifier": "psirt@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "psirt@cisco.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-08-10 12:19
Modified
2025-04-11 00:51
Severity ?
Summary
Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 on 5508 series controllers allows remote attackers to cause a denial of service (buffer leak and device crash) via ARP requests that trigger an ARP storm, aka Bug ID CSCte43508.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:cisco:unified_wireless_network_solution_software:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3199EF5-5086-4DDE-997F-9F7F15E9BB21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:cisco:unified_wireless_network_solution_software:7.0.98.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CFF7663-19E4-4DD8-BCA0-C1B03F630312",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:cisco:5508_wireless_controller:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AC836E1-650B-4D2A-A085-9DB574A3F060",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 on 5508 series controllers allows remote attackers to cause a denial of service (buffer leak and device crash) via ARP requests that trigger an ARP storm, aka Bug ID CSCte43508."
    },
    {
      "lang": "es",
      "value": "Cisco Unified Wireless Network (UWN) Solution v7.x anterior a v7.0.98.0 en controladores de la serie 5508, permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (fuga de b\u00faffer y ca\u00edda del dispositivo) a trav\u00e9s de peticiones ARP que desencadenan una tormenta ARP. Tambi\u00e9n conocido como Bug ID CSCte43508."
    }
  ],
  "id": "CVE-2010-2979",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-08-10T12:19:09.927",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2010-2979 (GCVE-0-2010-2979)
Vulnerability from cvelistv5
Published
2010-08-09 19:23
Modified
2024-09-16 17:28
Severity ?
CWE
  • n/a
Summary
Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 on 5508 series controllers allows remote attackers to cause a denial of service (buffer leak and device crash) via ARP requests that trigger an ARP storm, aka Bug ID CSCte43508.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:55:46.385Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 on 5508 series controllers allows remote attackers to cause a denial of service (buffer leak and device crash) via ARP requests that trigger an ARP storm, aka Bug ID CSCte43508."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-08-09T19:23:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-2979",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 on 5508 series controllers allows remote attackers to cause a denial of service (buffer leak and device crash) via ARP requests that trigger an ARP storm, aka Bug ID CSCte43508."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-2979",
    "datePublished": "2010-08-09T19:23:00Z",
    "dateReserved": "2010-08-09T00:00:00Z",
    "dateUpdated": "2024-09-16T17:28:27.809Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0370 (GCVE-0-2012-0370)
Vulnerability from cvelistv5
Published
2012-03-01 01:00
Modified
2024-08-06 18:23
Severity ?
CWE
  • n/a
Summary
Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0 and 7.1 before 7.1.91.0, when WebAuth is enabled, allow remote attackers to cause a denial of service (device reload) via a sequence of (1) HTTP or (2) HTTPS packets, aka Bug ID CSCtt47435.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:23:31.008Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120229 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
          },
          {
            "name": "20120229 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-02-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0 and 7.1 before 7.1.91.0, when WebAuth is enabled, allow remote attackers to cause a denial of service (device reload) via a sequence of (1) HTTP or (2) HTTPS packets, aka Bug ID CSCtt47435."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120229 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
        },
        {
          "name": "20120229 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-0370",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0 and 7.1 before 7.1.91.0, when WebAuth is enabled, allow remote attackers to cause a denial of service (device reload) via a sequence of (1) HTTP or (2) HTTPS packets, aka Bug ID CSCtt47435."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120229 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
            },
            {
              "name": "20120229 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-0370",
    "datePublished": "2012-03-01T01:00:00",
    "dateReserved": "2012-01-04T00:00:00",
    "dateUpdated": "2024-08-06T18:23:31.008Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2010-2980 (GCVE-0-2010-2980)
Vulnerability from cvelistv5
Published
2010-08-09 19:23
Modified
2024-09-17 04:20
Severity ?
CWE
  • n/a
Summary
Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 on 5508 series controllers allows remote attackers to cause a denial of service (pbuf exhaustion and device crash) via fragmented traffic, aka Bug ID CSCtd26794.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:55:46.484Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 on 5508 series controllers allows remote attackers to cause a denial of service (pbuf exhaustion and device crash) via fragmented traffic, aka Bug ID CSCtd26794."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-08-09T19:23:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-2980",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Unified Wireless Network (UWN) Solution 7.x before 7.0.98.0 on 5508 series controllers allows remote attackers to cause a denial of service (pbuf exhaustion and device crash) via fragmented traffic, aka Bug ID CSCtd26794."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html",
              "refsource": "CONFIRM",
              "url": "http://www.cisco.com/en/US/docs/wireless/controller/release/notes/crn7.0.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-2980",
    "datePublished": "2010-08-09T19:23:00Z",
    "dateReserved": "2010-08-09T00:00:00Z",
    "dateUpdated": "2024-09-17T04:20:19.138Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0369 (GCVE-0-2012-0369)
Vulnerability from cvelistv5
Published
2012-03-01 01:00
Modified
2024-08-06 18:23
Severity ?
CWE
  • n/a
Summary
Cisco Wireless LAN Controller (WLC) devices with software 6.0 and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (device reload) via a sequence of IPv6 packets, aka Bug ID CSCtt07949.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:23:30.618Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120229 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
          },
          {
            "name": "20120229 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-02-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Wireless LAN Controller (WLC) devices with software 6.0 and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (device reload) via a sequence of IPv6 packets, aka Bug ID CSCtt07949."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120229 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
        },
        {
          "name": "20120229 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-0369",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Wireless LAN Controller (WLC) devices with software 6.0 and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (device reload) via a sequence of IPv6 packets, aka Bug ID CSCtt07949."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120229 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
            },
            {
              "name": "20120229 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-0369",
    "datePublished": "2012-03-01T01:00:00",
    "dateReserved": "2012-01-04T00:00:00",
    "dateUpdated": "2024-08-06T18:23:30.618Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-3273 (GCVE-0-2020-3273)
Vulnerability from cvelistv5
Published
2020-04-15 20:11
Modified
2024-11-15 17:28
CWE
Summary
A vulnerability in the 802.11 Generic Advertisement Service (GAS) frame processing function of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS). The vulnerability is due to incomplete input validation of the 802.11 GAS frames that are processed by an affected device. An attacker could exploit this vulnerability by sending a crafted 802.11 GAS frame over the air to an access point (AP), and that frame would then be relayed to the affected WLC. Also, an attacker with Layer 3 connectivity to the WLC could exploit this vulnerability by sending a malicious 802.11 GAS payload in a Control and Provisioning of Wireless Access Points (CAPWAP) packet to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:30:57.547Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20200415 Cisco Wireless LAN Controller 802.11 Generic Advertisement Service Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-gas-dos-8FsE3AWH"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-3273",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:21:52.794648Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T17:28:32.318Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Wireless LAN Controller (WLC)",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2020-04-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the 802.11 Generic Advertisement Service (GAS) frame processing function of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS). The vulnerability is due to incomplete input validation of the 802.11 GAS frames that are processed by an affected device. An attacker could exploit this vulnerability by sending a crafted 802.11 GAS frame over the air to an access point (AP), and that frame would then be relayed to the affected WLC. Also, an attacker with Layer 3 connectivity to the WLC could exploit this vulnerability by sending a malicious 802.11 GAS payload in a Control and Provisioning of Wireless Access Points (CAPWAP) packet to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-15T20:11:23",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20200415 Cisco Wireless LAN Controller 802.11 Generic Advertisement Service Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-gas-dos-8FsE3AWH"
        }
      ],
      "source": {
        "advisory": "cisco-sa-wlc-gas-dos-8FsE3AWH",
        "defect": [
          [
            "CSCvr52059"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Wireless LAN Controller 802.11 Generic Advertisement Service Denial of Service Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2020-04-15T16:00:00-0700",
          "ID": "CVE-2020-3273",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Wireless LAN Controller 802.11 Generic Advertisement Service Denial of Service Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Wireless LAN Controller (WLC)",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the 802.11 Generic Advertisement Service (GAS) frame processing function of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS). The vulnerability is due to incomplete input validation of the 802.11 GAS frames that are processed by an affected device. An attacker could exploit this vulnerability by sending a crafted 802.11 GAS frame over the air to an access point (AP), and that frame would then be relayed to the affected WLC. Also, an attacker with Layer 3 connectivity to the WLC could exploit this vulnerability by sending a malicious 802.11 GAS payload in a Control and Provisioning of Wireless Access Points (CAPWAP) packet to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "8.6",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-119"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20200415 Cisco Wireless LAN Controller 802.11 Generic Advertisement Service Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-gas-dos-8FsE3AWH"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-wlc-gas-dos-8FsE3AWH",
          "defect": [
            [
              "CSCvr52059"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2020-3273",
    "datePublished": "2020-04-15T20:11:24.002566Z",
    "dateReserved": "2019-12-12T00:00:00",
    "dateUpdated": "2024-11-15T17:28:32.318Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-3262 (GCVE-0-2020-3262)
Vulnerability from cvelistv5
Published
2020-04-15 20:11
Modified
2024-11-15 17:28
CWE
Summary
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol handler of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to restart, resulting in a DoS condition.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:30:57.586Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20200415 Cisco Wireless LAN Controller CAPWAP Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-capwap-dos-Y2sD9uEw"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2020-3262",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-15T16:21:54.572852Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-15T17:28:41.816Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco Aironet Access Point Software",
          "vendor": "Cisco",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2020-04-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol handler of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to restart, resulting in a DoS condition."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-15T20:11:19",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20200415 Cisco Wireless LAN Controller CAPWAP Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-capwap-dos-Y2sD9uEw"
        }
      ],
      "source": {
        "advisory": "cisco-sa-wlc-capwap-dos-Y2sD9uEw",
        "defect": [
          [
            "CSCvq59667"
          ]
        ],
        "discovery": "INTERNAL"
      },
      "title": "Cisco Wireless LAN Controller CAPWAP Denial of Service Vulnerability",
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "DATE_PUBLIC": "2020-04-15T16:00:00-0700",
          "ID": "CVE-2020-3262",
          "STATE": "PUBLIC",
          "TITLE": "Cisco Wireless LAN Controller CAPWAP Denial of Service Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco Aironet Access Point Software",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Cisco"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol handler of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of CAPWAP packets. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to restart, resulting in a DoS condition."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
          }
        ],
        "impact": {
          "cvss": {
            "baseScore": "8.6",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20200415 Cisco Wireless LAN Controller CAPWAP Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-capwap-dos-Y2sD9uEw"
            }
          ]
        },
        "source": {
          "advisory": "cisco-sa-wlc-capwap-dos-Y2sD9uEw",
          "defect": [
            [
              "CSCvq59667"
            ]
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2020-3262",
    "datePublished": "2020-04-15T20:11:19.681008Z",
    "dateReserved": "2019-12-12T00:00:00",
    "dateUpdated": "2024-11-15T17:28:41.816Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0368 (GCVE-0-2012-0368)
Vulnerability from cvelistv5
Published
2012-03-01 01:00
Modified
2024-08-06 18:23
Severity ?
CWE
  • n/a
Summary
The administrative management interface on Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allows remote attackers to cause a denial of service (device crash) via a malformed URL in an HTTP request, aka Bug ID CSCts81997.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:23:30.977Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120229 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
          },
          {
            "name": "20120229 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-02-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The administrative management interface on Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allows remote attackers to cause a denial of service (device crash) via a malformed URL in an HTTP request, aka Bug ID CSCts81997."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120229 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
        },
        {
          "name": "20120229 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-0368",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The administrative management interface on Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allows remote attackers to cause a denial of service (device crash) via a malformed URL in an HTTP request, aka Bug ID CSCts81997."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120229 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
            },
            {
              "name": "20120229 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-0368",
    "datePublished": "2012-03-01T01:00:00",
    "dateReserved": "2012-01-04T00:00:00",
    "dateUpdated": "2024-08-06T18:23:30.977Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2012-0371 (GCVE-0-2012-0371)
Vulnerability from cvelistv5
Published
2012-03-01 01:00
Modified
2024-08-06 18:23
Severity ?
CWE
  • n/a
Summary
Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.4, when CPU-based ACLs are enabled, allow remote attackers to read or modify the configuration via unspecified vectors, aka Bug ID CSCtu56709.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:23:30.947Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20120229 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
          },
          {
            "name": "20120229 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-02-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.4, when CPU-based ACLs are enabled, allow remote attackers to read or modify the configuration via unspecified vectors, aka Bug ID CSCtu56709."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-04T18:57:02",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "20120229 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
        },
        {
          "name": "20120229 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2012-0371",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.4, when CPU-based ACLs are enabled, allow remote attackers to read or modify the configuration via unspecified vectors, aka Bug ID CSCtu56709."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20120229 Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc"
            },
            {
              "name": "20120229 Cisco Security Advisory: Multiple Vulnerabilities in Cisco Wireless LAN Controllers",
              "refsource": "BUGTRAQ",
              "url": "http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2012-0371",
    "datePublished": "2012-03-01T01:00:00",
    "dateReserved": "2012-01-04T00:00:00",
    "dateUpdated": "2024-08-06T18:23:30.947Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}