Cisco Wireless LAN Controller Multiple Vulnerabilities

High Nessus Plugin ID 118461

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, the Cisco Wireless LAN Controller (WLC) is affected by the following vulnerabilities:

- A privilege escalation vulnerability due to improper parsing of a specific TACACS attribute. A remote attacker, authenticating to TACACs via the GUI, could create a local account with administrative privileges. (CVE-2018-0417)

- A denial of service vulnerability due to flaws with specific timer mechanisms. A remote attacker could potentially cause the timer to crash resulting in a DoS condition.
(CVE-2018-0441)

- An information disclosure vulnerability due to insufficient checks when handling Control and Provisioning of Wireless Access Point keepalive requests. A remote attacker, with a specially crafted CAPWAP keepalive packet, could potentially read the devices memory. (CVE-2018-0442)

- A denial of service vulnerability due to improper validation of CAPWAP discovery request packets. A remote attacker could potentially disconnect associated APs, resulting in a DoS condition. (CVE-2018-0443)

Please see the included Cisco BIDs and the Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID(s) CSCvf66680, CSCvh65876, CSCve64652, and CSCvf66696.

See Also

http://www.nessus.org/u?5e14b610

http://www.nessus.org/u?4d106cd6

http://www.nessus.org/u?e4eb02b4

http://www.nessus.org/u?c9605ddd

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf66680

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvf66696

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh65876

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCve64652

Plugin Details

Severity: High

ID: 118461

File Name: cisco-sa-20181017-wlc-capwap-memory-leak.nasl

Version: 1.1

Type: combined

Family: CISCO

Published: 2018/10/26

Modified: 2018/10/26

Dependencies: 70122

Risk Information

Risk Factor: High

CVSS Score Source: CVE-2018-0443

CVSS Score Rationale: Based on vendor advisory.

CVSS v2.0

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3.0

Base Score: 8.6

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Vulnerability Information

CPE: cpe:/o:cpe:/h:cisco:wireless_lan_controller

Required KB Items: Host/Cisco/WLC/Version

Patch Publication Date: 2018/10/17

Vulnerability Publication Date: 2018/10/17

Reference Information

CVE: CVE-2018-0417, CVE-2018-0441, CVE-2018-0442, CVE-2018-0443

BID: 105664, 105667, 105680, 105686