Cisco Wireless LAN Controller 802.11 WME Packet Header Handling DoS (cisco-sa-20170405-wlc)

medium Nessus Plugin ID 99471

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, the Cisco Wireless LAN Controller (WLC) software running on the remote device is affected by a denial of service vulnerability in the 802.11 Wireless Multimedia Extensions (WME) action frame processing due to improper validation of of the 802.11 WME packet header. An unauthenticated, adjacent attacker can exploit this, via specially crafted 802.11 WME frames, to cause the WLC to reload.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCva86353.

See Also

http://www.nessus.org/u?270e2443

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCva86353

Plugin Details

Severity: Medium

ID: 99471

File Name: cisco-sa-20170405-wlc.nasl

Version: 1.6

Type: combined

Family: CISCO

Published: 4/19/2017

Updated: 8/20/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:cisco:wireless_lan_controller, cpe:/o:cisco:wireless_lan_controller_firmware

Required KB Items: Host/Cisco/WLC/Version, Host/Cisco/WLC/Port

Exploit Ease: No known exploits are available

Patch Publication Date: 4/5/2017

Vulnerability Publication Date: 4/5/2017

Reference Information

CVE: CVE-2016-9194

BID: 97424

CISCO-SA: cisco-sa-20170405-wlc

CISCO-BUG-ID: CSCva86353