Lucene search

K
ciscoCiscoCISCO-SA-20150527-CVE-2015-0756
HistoryMay 27, 2015 - 6:55 p.m.

Cisco Wireless LAN Controller TCP Denial of Service Vulnerability

2015-05-2718:55:33
tools.cisco.com
10

CVSS2

6.1

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.001

Percentile

44.7%

A vulnerability in the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, adjacent attacker to cause a Denial of Service (DoS) condition on the affected device.

The vulnerability is due to improper input validation. An attacker could exploit this vulnerability by sending crafted TCP traffic to the affected device. An exploit could allow the attacker to cause a DoS condition on the affected device and the associated wireless access points.

Cisco has confirmed the vulnerability and released software updates.

To exploit this vulnerability, an attacker must have access to the same broadcast or collision domain as the targeted device. This access requirement reduces the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

CVSS2

6.1

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.001

Percentile

44.7%

Related for CISCO-SA-20150527-CVE-2015-0756