Guest

Preview Tool

Cisco Bug: CSCuw29419 - Cisco Wireless LAN Controller Radius Packet of Disconnect Vulnerability

Last Modified

Nov 20, 2018

Products (19)

  • Cisco 5500 Series Wireless Controllers
  • Cisco Catalyst 6500 Series/7600 Series Wireless Services Module (WiSM)
  • Cisco 8510 Wireless Controller
  • Cisco 4404 Wireless LAN Controller
  • Cisco Catalyst 3750G Integrated Wireless LAN Controller
  • Cisco Wireless Services Module 2 (WiSM2)
  • Cisco 8540 Wireless Controller
  • Cisco Wireless Controller Software for SRE
  • Cisco 5508 Wireless Controller
  • Cisco 5520 Wireless Controller
View all products in Bug Search Tool Login Required

Known Affected Releases

7.0(250.0) 7.0(252.0) 7.2(200.27) 7.4 7.6 8.1 8.3(1.0)

Description (partial)

Symptom:
A vulnerability in the radius implementation of the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, 
remote attacker to cause a partial denial of service (DoS) condition by disconnecting user sessions.

The vulnerability is due to lack of proper input validation of the Radius Disconnect-Request packet. An attacker could 
exploit this vulnerability by sending crafted Radius UDP Disconnect-Request packets to the affected device. An exploit 
could allow the attacker to cause a partial DoS condition due to the disconnect of random user sessions.

Conditions:
Device running with default configuration running an affected version of software.

Related Community Discussions

8.1MR3 Beta Availability
8.1.123.x Available - 8.1MR3 Beta     Beta process is closed, final release 8.1.131.0 is now posted in CCO  Support   For any new issue during this test, please write to wnbu-mrbeta@external.cisco.com, pre-existing problems would be directed through normal TAC support channels, the image is TAC supported until CCO release of final code       Image types AS_5500* can be used for Wism2/2500/5508 controller types. Not 5520   AS_7500* can be used for 7500/8500/5520   AS_CTVM can be used for vWLC   ap1g4-ME ...
Latest activity: Mar 21, 2016
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.