var-201203-0226
Vulnerability from variot
Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.4, when CPU-based ACLs are enabled, allow remote attackers to read or modify the configuration via unspecified vectors, aka Bug ID CSCtu56709. The problem is Bug ID CSCtu56709 It is a problem.The setting may be read or changed by a third party. The Cisco Wireless LAN Controller is responsible for system-wide wireless LAN functions such as security policy, intrusion protection, RF management, quality of service, and mobility. Allows unauthenticated attackers to view and modify the configuration on the Cisco WLC affected by this vulnerability. Wireless controllers configured with CPU-based ACLs are more affected by this vulnerability, and an attacker can connect to TCP port 1023 to exploit this vulnerability. This issue is being tracked by Cisco Bug ID CSCtu56709. Workarounds are available that mitigate some of these vulnerabilities.
This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc
Affected Products
The Cisco WLC product family is affected by multiple vulnerabilities.
Vulnerable Products +------------------
For specific version information, refer to the Software Versions and Fixes section of this advisory.
Each of the following products is affected by at least one of the vulnerabilities covered in this Security Advisory:
- Cisco 2000 Series WLC
- Cisco 2100 Series WLC
- Cisco 2500 Series WLC
- Cisco 4100 Series WLC
- Cisco 4400 Series WLC
- Cisco 5500 Series WLC
- Cisco 500 Series Wireless Express Mobility Controllers
- Cisco Wireless Services Modules (WiSM)
- Cisco Wireless Services Modules version 2 (WiSM version 2)
- Cisco NME-AIR-WLC Modules for Integrated Services Routers (ISRs)
- Cisco NM-AIR-WLC Modules for Integrated Services Routers (ISRs)
- Cisco Catalyst 3750G Integrated WLCs
- Cisco Flex 7500 Series Cloud Controllers
Note: The Cisco 2000 Series WLCs, Cisco 4100 Series WLCs, Cisco NM-AIR-WLC, and Cisco 500 Series Wireless Express Mobility Controllers, have reached end-of-software maintenance. The following table includes the end-of-life document URL for each model:
+-------------------------------------------------------------------+ |Model |End of Life Document URL | |----------------------+--------------------------------------------| |Cisco 2000 Series WLC |http://www.cisco.com/en/US/prod/collateral/ | | |wireless/ps6302/ps8322/ps6308/ | | |prod_end-of-life_notice0900aecd805d22b0.html| |----------------------+--------------------------------------------| |Cisco 4100 Series WLC |http://www.cisco.com/en/US/prod/collateral/ | | |wireless/ps6302/ps8322/ps6307/ | | |prod_end-of-life_notice0900aecd803387a9.html| |----------------------+--------------------------------------------| |Cisco NM-AIR-WLC |http://www.cisco.com/en/US/prod/collateral/ | |Modules for ISR |modules/ps2797/ | | |prod_end-of-life_notice0900aecd806aeb34.html| |----------------------+--------------------------------------------| |Cisco 500 Series |http://www.cisco.com/en/US/prod/collateral/ | |Wireless Express |wireless/ps7306/ps7320/ps7339/ | |Mobility Controllers |end_of_life_c51-568040.html | +-------------------------------------------------------------------+
Determination of Software Versions +---------------------------------
To determine the WLC version that is running in a given environment, use one of the following methods:
- In the web interface, choose the Monitor tab, click Summary in the left pane, and note the Software Version field.
- In the command-line interface, issue the show sysinfo command as shown in the following example:
(Cisco Controller)> show sysinfo
Manufacturer's Name.. Cisco Systems Inc. Product Name......... Cisco Controller Product Version...... 5.1.151.0 RTOS Version......... Linux-2.6.10_mvl401 Bootloader Version... 4.0.207.0 Build Type........... DATA + WPS
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.