Guest

Preview Tool

Cisco Bug: CSCuz40221 - Cisco Wireless LAN Controller TSM SNMP Denial of Service Vulnerability

Last Modified

Sep 17, 2019

Products (1)

  • Cisco 5500 Series Wireless Controllers

Known Affected Releases

8.0(133.0)

Description (partial)

Symptom:
A vulnerability in the traffic stream metrics (TSM) implemented with the Inter-Access Point Protocol (IAPP) of the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition because the process on the WLC unexpectedly restarts. The DoS condition could occur when a subsequent Simple Network Management Protocol (SNMP) request is received for TSM information.

The device reloads when an SNMP request for TSM information is received. An attacker could exploit this vulnerability by sending crafted IAPP packets followed by an SNMP request for TSM information to the targeted device. An exploit could allow the attacker to cause a DoS condition when the WLC unexpectedly restarts.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-1

Conditions:
1. The WLC is configured for SNMP and TSM data collection.

2. All versions of Cisco Wireless LAN Controller, from 6.x to 8.x, prior to the first fixed versions of 8.0.140.0, 8.2.121.0, and 8.3.102.0 are vulnerable.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.