All the vulnerabilites related to cisco - wireless_lan_controller_software_7.4
Vulnerability from fkie_nvd
Published
2016-09-12 01:59
Modified
2024-11-21 02:56
Severity ?
Summary
Cisco Wireless LAN Controller (WLC) devices before 8.0.140.0, 8.1.x and 8.2.x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow remote attackers to cause a denial of service (device reload) by sending crafted Inter-Access Point Protocol (IAPP) packets and then sending a traffic stream metrics (TSM) information request over SNMP, aka Bug ID CSCuz40221.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:wireless_lan_controller_software:8.0.72.140:*:*:*:*:*:*:*", "matchCriteriaId": "C7FFA694-78D1-48A6-BFAC-EB101A636AC3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "127638A2-6E17-4228-8681-89382AC8CE1A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.1.59.24:*:*:*:*:*:*:*", "matchCriteriaId": "296F88C9-6874-44E2-B9D1-B3E1989660FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.1.105.0:*:*:*:*:*:*:*", "matchCriteriaId": "2C57126D-D6BE-4602-885C-04D7CCEE3FF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.1.111.0:*:*:*:*:*:*:*", "matchCriteriaId": "3D85E98B-4FAD-42B4-9A78-B5155992249E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.78.0:*:*:*:*:*:*:*", "matchCriteriaId": "E2486222-1595-4FA2-80E8-8EE996C11CD8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.116.21:*:*:*:*:*:*:*", "matchCriteriaId": "D3A79CB6-6094-46AC-8574-FF6DC7FB592C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.150.6:*:*:*:*:*:*:*", "matchCriteriaId": "2A558875-504D-4D2F-BF48-F29ABCCF6840", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.150.10:*:*:*:*:*:*:*", "matchCriteriaId": "D3C646C8-021E-4F3E-8580-C364A6FF6B8A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.171.5:*:*:*:*:*:*:*", "matchCriteriaId": "53DCF441-096D-444D-8995-FF71EC149471", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.171.6:*:*:*:*:*:*:*", "matchCriteriaId": "16AB56C1-1DB9-454E-836B-8AA56C4309FB", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.185.0:*:*:*:*:*:*:*", "matchCriteriaId": "7E918087-75F7-4742-B9B9-39FEE3A069A4", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.193.5:*:*:*:*:*:*:*", "matchCriteriaId": "7BD0A4A5-A9A4-46A9-BDE0-5203864D4E5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.2.195.10:*:*:*:*:*:*:*", "matchCriteriaId": "4B431407-D4A7-4A9A-8C9F-5E8C1D162149", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:3.6.0e:*:*:*:*:*:*:*", "matchCriteriaId": "1119C3DB-A423-46B8-8E21-558D3AE0F8A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.108:*:*:*:*:*:*:*", "matchCriteriaId": "E23E6B23-2DFC-4959-B69D-35B12A3674C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.0:*:*:*:*:*:*:*", "matchCriteriaId": "8F9E44A7-9C79-4937-B929-D7CD48969D44", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.155.5:*:*:*:*:*:*:*", "matchCriteriaId": "D91822EB-04F3-4590-9E74-C173D332FF64", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.8:*:*:*:*:*:*:*", "matchCriteriaId": "328B192D-6070-46C9-9B5E-E2D19197516E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.179.11:*:*:*:*:*:*:*", "matchCriteriaId": "9AEB928B-97EC-490F-A313-B565FB67C8D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.196:*:*:*:*:*:*:*", "matchCriteriaId": "27C3E9DF-439E-4319-BFA3-14D756069FFD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.206.0:*:*:*:*:*:*:*", "matchCriteriaId": "546C8A02-3C19-4AE8-98D6-D24342306764", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.217.0:*:*:*:*:*:*:*", "matchCriteriaId": "D882A253-143C-4561-B0CA-209D48A995F2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.0.219.0:*:*:*:*:*:*:*", "matchCriteriaId": "2AA48A99-0ED5-4FEB-8906-B68D4C5C702E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.171.0:*:*:*:*:*:*:*", "matchCriteriaId": "81CC513E-95EA-4FA0-AD70-25C51155AD26", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.181.0:*:*:*:*:*:*:*", "matchCriteriaId": "272C20B5-3EA4-4AFD-ACD6-15A8ABA73C83", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1.185.0:*:*:*:*:*:*:*", "matchCriteriaId": "11F235E4-673A-4EC4-98F6-423C68919AB8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "D16474F8-F7CC-445F-AB14-D8EB5CBB8A3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.61.0:*:*:*:*:*:*:*", "matchCriteriaId": "9A15A3CA-69E7-451D-AB84-43A6BBF17A2B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.99.0:*:*:*:*:*:*:*", "matchCriteriaId": "62424F6A-2D82-45C0-A7D3-540649DA5F5C", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.112.0:*:*:*:*:*:*:*", "matchCriteriaId": "8A17769C-A301-4BC9-A2B1-E442F78030C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.117.0:*:*:*:*:*:*:*", "matchCriteriaId": "F2290101-AEFA-4C4F-B8CE-620BDE6EA3F7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.130.0:*:*:*:*:*:*:*", "matchCriteriaId": "0947448E-D8C5-423D-BDF3-36BD29A83ABE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:*", "matchCriteriaId": "57C6B8CB-9277-463B-84EB-AEF36EE40E7B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.174.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDBD9C2D-514C-44D3-ADCD-D6F80E50BEF9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.176.0:*:*:*:*:*:*:*", "matchCriteriaId": "7A97D98B-6B3C-4AD1-8096-202E44F63B72", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.182.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C29D759-F433-42FB-ADA5-8FEA71085CC7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2_base:*:*:*:*:*:*:*", "matchCriteriaId": "26E0529E-C01C-4916-984F-B83C91CE3099", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.0:*:*:*:*:*:*:*", "matchCriteriaId": "1BAACE0C-DD44-4E81-ABEF-7896647CE8C8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.0.148.2:*:*:*:*:*:*:*", "matchCriteriaId": "5140A4F1-713E-4478-B807-83D826DAA374", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.151.0:*:*:*:*:*:*:*", "matchCriteriaId": "2143731F-749D-45ED-B2FE-A3893C5B1F6B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.152.0:*:*:*:*:*:*:*", "matchCriteriaId": "0C860DDD-33C6-4CC9-B8D2-4E3C9884C445", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.1.160.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2230FF3-EE71-408A-B558-74AAD024F661", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.157.0:*:*:*:*:*:*:*", "matchCriteriaId": "D513E4D8-B0A4-4C71-AD42-8EF9FE3E63B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:5.2.169.0:*:*:*:*:*:*:*", "matchCriteriaId": "60A2DB28-C42F-4E64-B0A2-63D83603D656", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:6.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "AD2FE92A-847A-459A-9407-1CB3A954B965", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0_base:*:*:*:*:*:*:*", "matchCriteriaId": "9B50430F-82F1-42BF-A3BA-733D83BB30B5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.1_base:*:*:*:*:*:*:*", "matchCriteriaId": "B9657E7A-E366-48FB-A161-3CC8DD088D2F", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.2_base:*:*:*:*:*:*:*", "matchCriteriaId": "B7DFEC44-189D-4125-88FF-77C291B072DC", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.3.101.0:*:*:*:*:*:*:*", "matchCriteriaId": "7233C6A0-9674-4C6D-ACC0-CC654CF117C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.3.103.8:*:*:*:*:*:*:*", "matchCriteriaId": "38D00567-54C8-4135-9A96-C19893F661C5", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.3.112:*:*:*:*:*:*:*", "matchCriteriaId": "B703F93F-4E0D-4DCD-8997-FC9E48334899", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.3_base:*:*:*:*:*:*:*", "matchCriteriaId": "4ED20104-D7CC-4563-BCD5-F87DAD568937", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "E4C069EB-29CB-4AF7-8886-D3EEBF0FFA60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.100:*:*:*:*:*:*:*", "matchCriteriaId": "0CB0B394-5DF5-4972-9463-43F39705DCD2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.100.60:*:*:*:*:*:*:*", "matchCriteriaId": "4D90CC27-03B4-4E8A-B7C7-31CF468CE9B1", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.110.0:*:*:*:*:*:*:*", "matchCriteriaId": "0D811122-DAD3-49F7-BF45-EB86A21C66AD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.121.0:*:*:*:*:*:*:*", "matchCriteriaId": "075749B7-8133-44B2-A9F6-8C57C1799088", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4_base:*:*:*:*:*:*:*", "matchCriteriaId": "490358BD-D4AC-41D9-954E-25D33A1D5545", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.5.102.0:*:*:*:*:*:*:*", "matchCriteriaId": "AE2CAF56-E0D1-4056-A714-564D67D6A6AA", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.5.102.11:*:*:*:*:*:*:*", "matchCriteriaId": "98D6FFA2-E82A-4E2F-89F4-F4CFFF6870A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.5_base:*:*:*:*:*:*:*", "matchCriteriaId": "A1ED1088-C683-48DC-81D5-2545B353814A", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.6.1.62:*:*:*:*:*:*:*", "matchCriteriaId": "C36A1927-65E0-431E-B8AD-CDC18F199801", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.6.100.0:*:*:*:*:*:*:*", "matchCriteriaId": "2CFFCE42-6068-49F7-A3F7-B3B76BD26AE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.6.110.0:*:*:*:*:*:*:*", "matchCriteriaId": "D769AF88-EF56-4F23-AB6D-2BE1005011B6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.6.120.0:*:*:*:*:*:*:*", "matchCriteriaId": "86F349D8-CC1E-4894-9810-6346646CB5AF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.6.130.0:*:*:*:*:*:*:*", "matchCriteriaId": "94C657F9-385D-430F-B1A8-6385B31D5B67", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:8.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F8EFBBD-1E3C-4456-B5FF-F1A9B007BAD3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:8.0.0.30220.385:*:*:*:*:*:*:*", "matchCriteriaId": "0401FB45-2948-4167-91BA-42C18E472262", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:8.0.100:*:*:*:*:*:*:*", "matchCriteriaId": "DCB28498-E77B-4929-9A46-8748CB4CE79B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:8.0.115.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C57197A-7E0B-4975-ABA3-EF2E610C580B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:8.0.120.0:*:*:*:*:*:*:*", "matchCriteriaId": "0872E094-1332-4EBE-9B2D-DFC7B6B0585D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:8.0.121.0:*:*:*:*:*:*:*", "matchCriteriaId": "E48594C8-799E-4F04-8FA2-70F628555283", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:8.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D61C08F-3F9A-4502-AED7-AC63C0045ACF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:8.1.104.37:*:*:*:*:*:*:*", "matchCriteriaId": "8D6E21CB-D531-441F-82E6-485F064F53E2", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:8.1.111.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2F785B0-45C2-4CF0-BCFF-9B8174D20D60", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:8.1.122.0:*:*:*:*:*:*:*", "matchCriteriaId": "078F630B-225D-4AFF-8F4A-55711A42FA5D", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:8.1.130.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0CF7D77-656D-4745-AC84-78F9636EC5FD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_6.0:182.0:*:*:*:*:*:*:*", "matchCriteriaId": "FAC9448E-EA9C-4280-A2E5-1556FE746A40", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_6.0:188.0:*:*:*:*:*:*:*", "matchCriteriaId": "37FDDF90-B234-4246-8AB7-3CF6F4E684E9", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_6.0:196.0:*:*:*:*:*:*:*", "matchCriteriaId": "8B03732E-28C2-4E33-A705-B749C3897EE6", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_6.0:199.4:*:*:*:*:*:*:*", "matchCriteriaId": "0A059B53-B23D-4F1A-BD78-35D3CE7537D3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_6.0:202.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC22EE11-E2FF-4D37-9143-A742F5D0A6EE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:98.0:*:*:*:*:*:*:*", "matchCriteriaId": "74AC084A-3D4C-402D-909C-FA7FEC086114", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:98.218:*:*:*:*:*:*:*", "matchCriteriaId": "9D11CC67-13EF-4BAD-A801-32719DAD2FA3", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:116.0:*:*:*:*:*:*:*", "matchCriteriaId": "E0429E0D-A260-4D20-8921-C1FB4C1F9BAF", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:220.0:*:*:*:*:*:*:*", "matchCriteriaId": "63B0F149-4EA4-48BA-BAF5-EF63F9E1C6DE", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:240.0:*:*:*:*:*:*:*", "matchCriteriaId": "6F3770B4-2062-4618-8CB0-C4C4F7995F29", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:250.0:*:*:*:*:*:*:*", "matchCriteriaId": "83BD8D6A-02B8-4DC3-971B-1D93065D09D7", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_7.0:252.0:*:*:*:*:*:*:*", "matchCriteriaId": "89723EEC-F0F6-4C6C-939B-8032AD8B37BD", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_7.1:91.0:*:*:*:*:*:*:*", "matchCriteriaId": "C2D31F2E-1D1C-4699-9004-69A22864518B", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_7.2:103.0:*:*:*:*:*:*:*", "matchCriteriaId": "866A85C2-81F7-45E0-9FA1-15EAAF87CC25", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_7.4:1.19:*:*:*:*:*:*:*", "matchCriteriaId": "947CF04B-D8F0-4ACD-AEA6-B994F4CEFA84", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_7.4:1.54:*:*:*:*:*:*:*", "matchCriteriaId": "B18C2D9A-F2B1-4607-BADD-E0BD0FC4347E", "vulnerable": true }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software_7.4:140.0:*:*:*:*:*:*:*", "matchCriteriaId": "8A6D299D-4ECF-4113-829E-E5DFB982EACF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_lan_controller:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E08C420-97C2-4323-9388-D6C32E83BBF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cisco Wireless LAN Controller (WLC) devices before 8.0.140.0, 8.1.x and 8.2.x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow remote attackers to cause a denial of service (device reload) by sending crafted Inter-Access Point Protocol (IAPP) packets and then sending a traffic stream metrics (TSM) information request over SNMP, aka Bug ID CSCuz40221." }, { "lang": "es", "value": "Dispositivos Cisco Wireless LAN Controller (WLC) en versiones anteriores a 8.0.140.0, 8.1.x y 8.2.x en versiones anteriores a 8.2.121.0 y 8.3.x en versiones anteriores a 8.3.102.0 permiten a atacantes remotos provocar una denegaci\u00f3n de servicio (recarga del dispositivo) mediante el env\u00edo de paquetes Inter-Access Point Protocol (IAPP) manipulados y despu\u00e9s, el env\u00edo de peticiones de informaci\u00f3n de m\u00e9tricas de flujo de tr\u00e1fico (TSM) a trav\u00e9s de SNMP, vulnerabilidad tambi\u00e9n conocida como Bug ID CSCuz40221." } ], "id": "CVE-2016-6375", "lastModified": "2024-11-21T02:56:00.477", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2016-09-12T01:59:01.130", "references": [ { "source": "ykramarz@cisco.com", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-1" }, { "source": "ykramarz@cisco.com", "url": "http://www.securityfocus.com/bid/92712" }, { "source": "ykramarz@cisco.com", "url": "http://www.securitytracker.com/id/1036721" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/92712" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1036721" } ], "sourceIdentifier": "ykramarz@cisco.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-399" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2016-6375
Vulnerability from cvelistv5
Published
2016-09-12 01:00
Modified
2024-08-06 01:29
Severity ?
EPSS score ?
Summary
Cisco Wireless LAN Controller (WLC) devices before 8.0.140.0, 8.1.x and 8.2.x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow remote attackers to cause a denial of service (device reload) by sending crafted Inter-Access Point Protocol (IAPP) packets and then sending a traffic stream metrics (TSM) information request over SNMP, aka Bug ID CSCuz40221.
References
▼ | URL | Tags |
---|---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-1 | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id/1036721 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/92712 | vdb-entry, x_refsource_BID |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T01:29:19.551Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20160831 Cisco Wireless LAN Controller TSM SNMP Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-1" }, { "name": "1036721", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1036721" }, { "name": "92712", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/92712" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "Cisco Wireless LAN Controller (WLC) devices before 8.0.140.0, 8.1.x and 8.2.x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow remote attackers to cause a denial of service (device reload) by sending crafted Inter-Access Point Protocol (IAPP) packets and then sending a traffic stream metrics (TSM) information request over SNMP, aka Bug ID CSCuz40221." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2016-11-25T20:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "20160831 Cisco Wireless LAN Controller TSM SNMP Denial of Service Vulnerability", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-1" }, { "name": "1036721", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1036721" }, { "name": "92712", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/92712" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2016-6375", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cisco Wireless LAN Controller (WLC) devices before 8.0.140.0, 8.1.x and 8.2.x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow remote attackers to cause a denial of service (device reload) by sending crafted Inter-Access Point Protocol (IAPP) packets and then sending a traffic stream metrics (TSM) information request over SNMP, aka Bug ID CSCuz40221." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20160831 Cisco Wireless LAN Controller TSM SNMP Denial of Service Vulnerability", "refsource": "CISCO", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-1" }, { "name": "1036721", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1036721" }, { "name": "92712", "refsource": "BID", "url": "http://www.securityfocus.com/bid/92712" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2016-6375", "datePublished": "2016-09-12T01:00:00", "dateReserved": "2016-07-26T00:00:00", "dateUpdated": "2024-08-06T01:29:19.551Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }