Cisco Wireless LAN Controller Multiple DoS

high Nessus Plugin ID 99472


The remote device is missing vendor-supplied security patches.


According to its self-reported version, the Cisco Wireless LAN Controller (WLC) software running on the remote device is affected by multiple denial of service vulnerabilities :

- A denial of service vulnerability exists in the RADIUS Change of Authorization (CoA) request processing due to improper validation of the RADIUS CoA packet header. An unauthenticated, remote attacker can exploit this, via a specially crafted RADIUS CoA packet, to disconnect connections through the WLC. (CVE-2016-9195)

- A denial of service vulnerability exists in the web management interface due to a missing internal handler for a specific request. An unauthenticated, remote attacker can exploit this, by accessing a hidden URL on the web management interface, to cause the device to reload. (CVE-2017-3832)


Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvb01835 and CSCvb48198.

See Also

Plugin Details

Severity: High

ID: 99472

File Name: cisco-sa-20170405-wlc1.nasl

Version: 1.6

Type: combined

Family: CISCO

Published: 4/19/2017

Updated: 8/20/2020

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Temporal Vector: E:U/RL:OF/RC:C


Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/h:cisco:wireless_lan_controller, cpe:/o:cisco:wireless_lan_controller_firmware

Required KB Items: Host/Cisco/WLC/Version, Host/Cisco/WLC/Port

Exploit Ease: No known exploits are available

Patch Publication Date: 4/5/2017

Vulnerability Publication Date: 4/5/2017

Reference Information

CVE: CVE-2016-9195, CVE-2017-3832

BID: 97421, 97425