CVE-2016-6376 (GCVE-0-2016-6376)
Vulnerability from cvelistv5
Published
2016-09-02 00:00
Modified
2024-08-06 01:29
Severity ?
CWE
  • n/a
Summary
The Adaptive Wireless Intrusion Prevention System (wIPS) feature on Cisco Wireless LAN Controller (WLC) devices before 8.0.140.0, 8.1.x and 8.2.x before 8.2.121.0, and 8.3.x before 8.3.102.0 allows remote attackers to cause a denial of service (device restart) via a malformed wIPS packet, aka Bug ID CSCuz40263.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:29:19.324Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1036720",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1036720"
          },
          {
            "name": "92716",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/92716"
          },
          {
            "name": "20160831 Cisco Wireless LAN Controller wIPS Denial of Service Vulnerability",
            "tags": [
              "vendor-advisory",
              "x_refsource_CISCO",
              "x_transferred"
            ],
            "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-08-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Adaptive Wireless Intrusion Prevention System (wIPS) feature on Cisco Wireless LAN Controller (WLC) devices before 8.0.140.0, 8.1.x and 8.2.x before 8.2.121.0, and 8.3.x before 8.3.102.0 allows remote attackers to cause a denial of service (device restart) via a malformed wIPS packet, aka Bug ID CSCuz40263."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T20:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1036720",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1036720"
        },
        {
          "name": "92716",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/92716"
        },
        {
          "name": "20160831 Cisco Wireless LAN Controller wIPS Denial of Service Vulnerability",
          "tags": [
            "vendor-advisory",
            "x_refsource_CISCO"
          ],
          "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2016-6376",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Adaptive Wireless Intrusion Prevention System (wIPS) feature on Cisco Wireless LAN Controller (WLC) devices before 8.0.140.0, 8.1.x and 8.2.x before 8.2.121.0, and 8.3.x before 8.3.102.0 allows remote attackers to cause a denial of service (device restart) via a malformed wIPS packet, aka Bug ID CSCuz40263."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1036720",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1036720"
            },
            {
              "name": "92716",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/92716"
            },
            {
              "name": "20160831 Cisco Wireless LAN Controller wIPS Denial of Service Vulnerability",
              "refsource": "CISCO",
              "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2016-6376",
    "datePublished": "2016-09-02T00:00:00",
    "dateReserved": "2016-07-26T00:00:00",
    "dateUpdated": "2024-08-06T01:29:19.324Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2016-6376\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2016-09-02T00:59:04.420\",\"lastModified\":\"2025-04-12T10:46:40.837\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The Adaptive Wireless Intrusion Prevention System (wIPS) feature on Cisco Wireless LAN Controller (WLC) devices before 8.0.140.0, 8.1.x and 8.2.x before 8.2.121.0, and 8.3.x before 8.3.102.0 allows remote attackers to cause a denial of service (device restart) via a malformed wIPS packet, aka Bug ID CSCuz40263.\"},{\"lang\":\"es\",\"value\":\"La funcionalidad Adaptive Wireless Intrusion Prevention System (wIPS) en dispositivos Cisco Wireless LAN Controller (WLC) en versiones anteriores a 8.0.140.0, 8.1.x y 8.2.x en versiones anteriores a 8.2.121.0 y 8.3.x en versiones anteriores a 8.3.102.0 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (reinicio del dispositivo) a trav\u00e9s de un paquete wIPS mal formado, tambi\u00e9n conocido como Bug ID CSCuz40263.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"ADJACENT_NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":6.1,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.0_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F0A0F12-B56E-40E2-9B0F-3E0B8D881D52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.1.59.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3534E61A-C158-433A-90FE-59E4A42EF32C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.1.105.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBB4E162-13BA-4516-8AFD-55FADCEF0782\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.1.111.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A753D16D-353A-4F5E-8ECF-601C95348ECF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.2.78.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"110F5DFF-A9E0-413B-955D-30665BEAB927\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.2.116.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D1EA287-F44B-4BDE-A158-E1309667ED17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.2.150.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"881D0464-B1CC-45C4-8190-A6F673BE163D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.2.150.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB5C7A08-B6F1-42C5-A9AA-85AD72435565\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.2.171.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFCC4233-D996-47EC-95E3-44FC57A9D1EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.2.171.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"123A2479-7B8D-49F2-96B2-02D4FACC7C9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.2.185.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB1A868-6A21-4960-9333-526DDA1DC9B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.2.193.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC702CB9-636D-4E8F-AFE1-3C5F4117804A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.2.195.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C02A7416-71BF-4D9B-9864-2C2A6DC2E7B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:3.6.0e:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BF5116E-5836-4A18-A88D-9319CF77D27D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.0.108:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD3152F9-98E9-4832-B9E5-9D4ADBC90C52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.0.155.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1545A5BB-2591-4908-87E5-90F5598F02E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.0.155.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68ED4705-3249-476C-8DA8-B64D1BC76045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.0.179.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34773C93-534F-4D9F-A4B3-DDC4DBDFFF03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.0.179.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF9B72F9-CFE2-404B-BACB-3A044D18E4C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.0.196:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBF42FC4-A4C0-455B-AFA4-B3A643B0FB46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.0.206.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D69C71-CB3D-4BE6-AFF5-B54979A56023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.0.217.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8AE1B28-FAC3-4BD8-BE46-B898C0D09F6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.0.219.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7FEBFADB-421B-4C9C-96CC-C0504A64D837\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.1.171.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A087365-E3F3-472C-B2B0-0834C3DE91E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.1.181.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"098D285E-819C-4AAB-B608-5A59BDC3F04A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.1.185.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56414527-AC9C-4D54-9340-10753574418D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.1_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF0A001-1250-4242-AB0E-67BF4BED503B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.2.61.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30328F81-F682-4193-AC10-32B85CCB5EBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.2.99.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC05DA06-1D47-4165-95B0-FF5ECB5BC683\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.2.112.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B65DE2D5-E5AF-4661-B433-A844296F2016\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.2.117.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07F0E902-9A98-4D24-99DB-2C448AC1FEED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.2.130.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDEA437E-1787-4D2A-B59A-442F84AA2F34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.2.173.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46495838-CD45-479A-A8A6-33C50955E1AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.2.174.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC216EBE-9059-43FD-8C5E-D1DE702D2132\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.2.176.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14ED3DE7-25B0-43E1-97EE-95F60F51ABFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.2.182.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5528AEAB-88D8-4C19-91E5-4E5E51438307\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:4.2_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6B7F42E-80D7-4324-A617-EEEA1C94D874\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:5.0.148.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5047BC1D-F6C1-4C53-839C-F4E6C463FC66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:5.0.148.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6704FB3A-CD36-4720-A342-481376F5E837\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:5.1.151.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87154527-1843-4F47-BBCE-C03C057D13B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:5.1.152.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25D30DB3-D173-4AF7-B668-0B8502CA9C9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:5.1.160.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94E2EFBD-7C05-4CB4-9FAD-6ABC54614D2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:5.2.157.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"906F9233-7DEF-4742-9AF3-50B6C231A9F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:5.2.169.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BE9F19D-1701-40BC-A374-111B5F38BE46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:6.0_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BD7A5C2-6354-449D-B715-2E9FFDD2E6FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.0_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A1B0325-D287-4286-B7E9-DB148881D9E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.1_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D547FB25-6486-4A77-99E6-C8F8EA9D5407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.2_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8FE090AB-88B8-4A42-9CED-FF54B2C812E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.3.101.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1538A4DA-6D77-4289-B47C-9BE2C7BDC036\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.3.103.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"04FDC2A1-F522-440B-9C5E-18729C0C34E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.3.112:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE292FF9-9674-4251-9EF3-AD4A4F9CCC15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.3_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0782064-881F-4ADB-880A-E005AFFE5ADC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.4.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C1E6716-BBDC-43FB-8016-10281E360049\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.4.100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E98435C2-EAD9-45BE-AE9A-CD1499F4239F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.4.100.60:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75473B22-A59F-471A-9DB8-8FA9FD504DC4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.4.110.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12FD9D8F-2E52-4CA9-94BD-65F8B1FF26C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.4.121.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05AEADF2-9986-432A-8416-1D138C8C94D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.4_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"246EDF05-FF4B-47FB-9A72-6417F239F0EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.5.102.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2FE2157-DE6C-4002-A209-091457BFA7F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.5.102.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3CB2EE4-565E-4EC0-978C-80738C5F8307\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.5_base:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED69F11C-153E-442B-8F7C-57961A25AAEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.6.1.62:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3D30E7A-4B2C-4A1E-B52C-C209757829F3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.6.100.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB33D00D-7DCB-4150-9907-1365066F3767\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.6.110.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9051AFDE-A519-4701-9AD5-CBA7AEE46B0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.6.120.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"354D3747-A6AB-41AA-8DD4-C17C0461EF7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:7.6.130.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FE75C02-0E3E-4BA3-8E86-2FEA9EEB7E40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:8.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6EA1478-B988-4DD7-A937-FB91FB0DEDB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:8.0.0.30220.385:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B467125C-5491-4066-A35A-891B78AD0A53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:8.0.72.140:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13FACACE-CF96-474D-BA3E-F289BD96CF6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:8.0.100:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E439FF8-91DE-43E9-BE65-59BCEC52F3BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:8.0.115.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B798E5A-E108-4465-BD2B-A2F4ADFDB363\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:8.0.120.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97971195-3E04-4AC1-95BC-479CE2CAB389\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:8.0.121.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"031A8A69-4E46-4EE5-B0A8-0A74E7C66A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:8.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B00858F6-C0AD-4822-9990-E0126AB43EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:8.1.104.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6528ED0-853F-4475-AAD7-7F9B5E0DFE3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:8.1.111.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B83E372-CFD8-4DDD-80F7-E3128D0C5E72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:8.1.122.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7D5A815-BA48-43A5-8CD4-2E580B2CB0D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller:8.1.130.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA6129F0-5195-41AC-AFF3-50518B1ADB9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_6.0:182.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55746AD1-5C44-4144-BBE3-53F4D654E57A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_6.0:188.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A74E0159-DA37-4AC2-8AA3-D6FA83F0DFF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_6.0:196.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B297FCF3-6FC4-4C0E-89A9-A760FF9A58CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_6.0:199.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F40022CC-A0AB-47EA-B089-9A3E66E49727\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_6.0:202.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED3D92BC-3052-4B3E-8152-ACFC8B507D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_7.0:98.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AEC6779-072A-43F2-AD75-9056D783B99D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_7.0:98.218:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88D96498-EF62-4B8E-AB8A-E326A306D473\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_7.0:116.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BA2A940-A36F-4903-9A9D-DB0269D01C9F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_7.0:220.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"171F7669-64D7-4E1E-9766-86B5A1085B2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_7.0:240.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCCD4C58-E8A6-470C-8324-CAD6F149C87F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_7.0:250.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97458DAB-1E88-4552-92D0-2C14B074E8C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_7.0:252.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FB2040D-5969-48D8-89FE-53C30B1483A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_7.1:91.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6075E464-5D78-492A-B85F-1C053E9B8CE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_7.2:103.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38F12EF1-A79E-446F-8A31-E188FF1C6B7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_7.4:1.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225D1199-74C7-4AAB-A434-F03DE0D57539\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_7.4:1.54:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25A6025A-6BE3-4BCF-A884-2EE630752459\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:cisco:wireless_lan_controller_7.4:140.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13ACDA7-F6C8-42E9-8748-14730F4D06D2\"}]}]}],\"references\":[{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-2\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/92716\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://www.securitytracker.com/id/1036720\",\"source\":\"psirt@cisco.com\"},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/92716\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id/1036720\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…