Cisco Wireless LAN Controller Software IAPP Message Handling Denial of Service Vulnerabilities

medium Nessus Plugin ID 124332

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco Wireless LAN Controller (WLC) is affected by following multiple vulnerabilities

- Multiple vulnerabilities in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.The vulnerabilities exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerabilities by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. (CVE-2019-1799, CVE-2019-1796, CVE-2019-1800)

Please see the included Cisco BIDs and Cisco Security Advisory for more information

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvh91032, CSCvh96364, CSCvi89027

See Also

http://www.nessus.org/u?dc39ed65

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh91032

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvh96364

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvi89027

Plugin Details

Severity: Medium

ID: 124332

File Name: cisco-sa-20190417-wlc-iapp.nasl

Version: 1.8

Type: local

Family: CISCO

Published: 4/26/2019

Updated: 8/20/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2019-1799

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Required KB Items: Host/Cisco/WLC/Version, Host/Cisco/WLC/Port

Exploit Ease: No known exploits are available

Patch Publication Date: 4/17/2019

Vulnerability Publication Date: 4/17/2019

Reference Information

CVE: CVE-2019-1796, CVE-2019-1799, CVE-2019-1800

CWE: CWE-399

CISCO-SA: cisco-sa-20190417-wlc-iapp

IAVA: 2019-A-0132

CISCO-BUG-ID: CSCvh91032, CSCvh96364, CSCvi89027