var-201505-0172
Vulnerability from variot
The web administration interface on Cisco Wireless LAN Controller (WLC) devices before 7.0.241, 7.1.x through 7.4.x before 7.4.122, and 7.5.x and 7.6.x before 7.6.120 allows remote authenticated users to cause a denial of service (device crash) via unspecified parameters, aka Bug IDs CSCum65159 and CSCum65252. An attacker could exploit this vulnerability to cause the affected device to crash, resulting in a denial of service. This issue is being tracked by Cisco Bug ID's CSCum65159 and CSCum65252. The following versions are affected: Cisco WLC prior to 7.0.241, prior to 7.4.122, prior to 7.6.120
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201505-0172", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "wireless lan controller software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.0.116.0" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.4.100" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.6.100.0" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.0.98.0" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.4.1.54" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.4_base" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.0.220.0" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.0.98.218" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "7.0_base" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.4.100.60" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.4.110.0" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "7.4.121.0" }, { "model": "wireless lan controller software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.4.x" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.6.120" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.1.x from 7.4.122" }, { "model": "wireless lan controller software", "scope": "lt", "trust": 0.8, "vendor": "cisco", "version": "7.6.x" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7.5.x" }, { "model": "wireless lan controller", "scope": "lt", "trust": 0.6, "vendor": "cisco", "version": "7.0.241" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.1.x-7.4.x(\u003c7.4.122)" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.5.x" }, { "model": "wireless lan controller", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.6.x(\u003c7.6.120)" }, { "model": "wireless lan controller software", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "7.6.110.0" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03231" }, { "db": "JVNDB", "id": "JVNDB-2015-002712" }, { "db": "NVD", "id": "CVE-2015-0726" }, { "db": "CNNVD", "id": "CNNVD-201505-243" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.100.60:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.100:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.1.54:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.110.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0.220.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0.98.218:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.6.100.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.121.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0.116.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.0.98.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2015-0726" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "74641" } ], "trust": 0.3 }, "cve": "CVE-2015-0726", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "NVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "impactScore": 6.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "Single", "author": "NVD", "availabilityImpact": "Complete", "baseScore": 6.8, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2015-0726", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "CNVD-2015-03231", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "exploitabilityScore": 8.0, "id": "VHN-78672", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:S/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2015-0726", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNVD", "id": "CNVD-2015-03231", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201505-243", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-78672", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03231" }, { "db": "VULHUB", "id": "VHN-78672" }, { "db": "JVNDB", "id": "JVNDB-2015-002712" }, { "db": "NVD", "id": "CVE-2015-0726" }, { "db": "CNNVD", "id": "CNNVD-201505-243" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The web administration interface on Cisco Wireless LAN Controller (WLC) devices before 7.0.241, 7.1.x through 7.4.x before 7.4.122, and 7.5.x and 7.6.x before 7.6.120 allows remote authenticated users to cause a denial of service (device crash) via unspecified parameters, aka Bug IDs CSCum65159 and CSCum65252. An attacker could exploit this vulnerability to cause the affected device to crash, resulting in a denial of service. \nThis issue is being tracked by Cisco Bug ID\u0027s CSCum65159 and CSCum65252. The following versions are affected: Cisco WLC prior to 7.0.241, prior to 7.4.122, prior to 7.6.120", "sources": [ { "db": "NVD", "id": "CVE-2015-0726" }, { "db": "JVNDB", "id": "JVNDB-2015-002712" }, { "db": "CNVD", "id": "CNVD-2015-03231" }, { "db": "BID", "id": "74641" }, { "db": "VULHUB", "id": "VHN-78672" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2015-0726", "trust": 3.4 }, { "db": "BID", "id": "74641", "trust": 2.6 }, { "db": "SECTRACK", "id": "1032327", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2015-002712", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201505-243", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2015-03231", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-78672", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03231" }, { "db": "VULHUB", "id": "VHN-78672" }, { "db": "BID", "id": "74641" }, { "db": "JVNDB", "id": "JVNDB-2015-002712" }, { "db": "NVD", "id": "CVE-2015-0726" }, { "db": "CNNVD", "id": "CNNVD-201505-243" } ] }, "id": "VAR-201505-0172", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2015-03231" }, { "db": "VULHUB", "id": "VHN-78672" } ], "trust": 1.2126263 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03231" } ] }, "last_update_date": "2023-12-18T13:39:18.236000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "38789", "trust": 0.8, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=38789" }, { "title": "Patch for Cisco Wireless LAN Controller Denial of Service Vulnerability (CNVD-2015-03231)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/58656" }, { "title": "Cisco Wireless LAN Controller Web Administration Interface Remediation measures for denial of service vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=147660" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03231" }, { "db": "JVNDB", "id": "JVNDB-2015-002712" }, { "db": "CNNVD", "id": "CNNVD-201505-243" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-20", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-78672" }, { "db": "JVNDB", "id": "JVNDB-2015-002712" }, { "db": "NVD", "id": "CVE-2015-0726" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "http://www.securityfocus.com/bid/74641" }, { "trust": 2.0, "url": "http://tools.cisco.com/security/center/viewalert.x?alertid=38789" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1032327" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0726" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0726" }, { "trust": 0.3, "url": "http://www.cisco.com/" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/ps6302/products_sub_category_home.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2015-03231" }, { "db": "VULHUB", "id": "VHN-78672" }, { "db": "BID", "id": "74641" }, { "db": "JVNDB", "id": "JVNDB-2015-002712" }, { "db": "NVD", "id": "CVE-2015-0726" }, { "db": "CNNVD", "id": "CNNVD-201505-243" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2015-03231" }, { "db": "VULHUB", "id": "VHN-78672" }, { "db": "BID", "id": "74641" }, { "db": "JVNDB", "id": "JVNDB-2015-002712" }, { "db": "NVD", "id": "CVE-2015-0726" }, { "db": "CNNVD", "id": "CNNVD-201505-243" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-05-20T00:00:00", "db": "CNVD", "id": "CNVD-2015-03231" }, { "date": "2015-05-16T00:00:00", "db": "VULHUB", "id": "VHN-78672" }, { "date": "2015-05-13T00:00:00", "db": "BID", "id": "74641" }, { "date": "2015-05-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-002712" }, { "date": "2015-05-16T14:59:02.187000", "db": "NVD", "id": "CVE-2015-0726" }, { "date": "2015-05-15T00:00:00", "db": "CNNVD", "id": "CNNVD-201505-243" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2015-05-21T00:00:00", "db": "CNVD", "id": "CNVD-2015-03231" }, { "date": "2017-01-06T00:00:00", "db": "VULHUB", "id": "VHN-78672" }, { "date": "2015-05-13T00:00:00", "db": "BID", "id": "74641" }, { "date": "2015-05-19T00:00:00", "db": "JVNDB", "id": "JVNDB-2015-002712" }, { "date": "2021-04-16T17:27:07.230000", "db": "NVD", "id": "CVE-2015-0726" }, { "date": "2021-04-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201505-243" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201505-243" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Wireless LAN Controller Device Web Service disruption in the management interface (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2015-002712" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Input Validation Error", "sources": [ { "db": "BID", "id": "74641" }, { "db": "CNNVD", "id": "CNNVD-201505-243" } ], "trust": 0.9 } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.