CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
53.3%
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol of the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
The vulnerability is due to insufficient data packet validation. An attacker could exploit this vulnerability by sending a crafted CAPWAP packet to the Cisco WLC.
Cisco has confirmed the vulnerability in a security notice; however, software updates are not available.
To exploit this vulnerability, the attacker may need access to trusted, internal networks in which the targeted device may reside to send crafted CAPWAP packets to the device. This access requirement may reduce the likelihood of a successful exploit.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | wireless_lan_controller | 4.0 | cpe:2.3:h:cisco:wireless_lan_controller:4.0:*:*:*:*:*:*:* |
cisco | wireless_lan_controller | 3.2 | cpe:2.3:h:cisco:wireless_lan_controller:3.2:*:*:*:*:*:*:* |
cisco | wireless_lan_controller | 3.1 | cpe:2.3:h:cisco:wireless_lan_controller:3.1:*:*:*:*:*:*:* |
cisco | wireless_lan_controller | 4.1 | cpe:2.3:h:cisco:wireless_lan_controller:4.1:*:*:*:*:*:*:* |
cisco | wireless_lan_controller | 3.0 | cpe:2.3:h:cisco:wireless_lan_controller:3.0:*:*:*:*:*:*:* |
cisco | wireless_lan_controller | 4.2 | cpe:2.3:h:cisco:wireless_lan_controller:4.2:*:*:*:*:*:*:* |
cisco | wireless_lan_controller | 5.0 | cpe:2.3:h:cisco:wireless_lan_controller:5.0:*:*:*:*:*:*:* |
cisco | wireless_lan_controller | 5.1 | cpe:2.3:h:cisco:wireless_lan_controller:5.1:*:*:*:*:*:*:* |
cisco | wireless_lan_controller | 5.2 | cpe:2.3:h:cisco:wireless_lan_controller:5.2:*:*:*:*:*:*:* |
cisco | wireless_lan_controller | 6.0 | cpe:2.3:h:cisco:wireless_lan_controller:6.0:*:*:*:*:*:*:* |