Cisco Wireless LAN Controller Multiple Vulnerabilities

High Nessus Plugin ID 118461

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, the Cisco Wireless LAN
Controller (WLC) is affected by the following vulnerabilities:

- A privilege escalation vulnerability due to improper parsing
of a specific TACACS attribute. A remote attacker,
authenticating to TACACs via the GUI, could create a local
account with administrative privileges. (CVE-2018-0417)

- A denial of service vulnerability due to flaws with specific
timer mechanisms. A remote attacker could potentially cause
the timer to crash resulting in a DoS condition.
(CVE-2018-0441)

- An information disclosure vulnerability due to insufficient
checks when handling Control and Provisioning of Wireless
Access Point keepalive requests. A remote attacker, with a
specially crafted CAPWAP keepalive packet, could potentially
read the devices memory. (CVE-2018-0442)

- A denial of service vulnerability due to improper validation
of CAPWAP discovery request packets. A remote attacker could
potentially disconnect associated APs, resulting in a DoS
condition. (CVE-2018-0443)

Please see the included Cisco BIDs and the Cisco Security Advisory for
more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID(s)
CSCvf66680, CSCvh65876, CSCve64652, and CSCvf66696.

See Also

http://www.nessus.org/u?5e14b610

http://www.nessus.org/u?4d106cd6

http://www.nessus.org/u?e4eb02b4

http://www.nessus.org/u?c9605ddd

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf66680

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf66696

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh65876

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCve64652

Plugin Details

Severity: High

ID: 118461

File Name: cisco-sa-20181017-wlc-capwap-memory-leak.nasl

Version: 1.1

Type: combined

Family: CISCO

Published: 2018/10/26

Modified: 2018/10/26

Dependencies: 70122

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2018-0443

CVSS Score Rationale: Based on vendor advisory.

CVSS v2.0

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3.0

Base Score: 8.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Vulnerability Information

CPE: cpe:/o:cpe:/h:cisco:wireless_lan_controller

Patch Publication Date: 2018/10/17

Vulnerability Publication Date: 2018/10/17

Reference Information

CVE: CVE-2018-0417, CVE-2018-0441, CVE-2018-0442, CVE-2018-0443

BID: 105664, 105667, 105680, 105686