Cisco Bug: CSCuz40221 - Cisco Wireless LAN Controller TSM SNMP Denial of Service Vulnerability
Sep 17, 2019
- Cisco 5500 Series Wireless Controllers
Known Affected Releases
Symptom: A vulnerability in the traffic stream metrics (TSM) implemented with the Inter-Access Point Protocol (IAPP) of the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition because the process on the WLC unexpectedly restarts. The DoS condition could occur when a subsequent Simple Network Management Protocol (SNMP) request is received for TSM information. The device reloads when an SNMP request for TSM information is received. An attacker could exploit this vulnerability by sending crafted IAPP packets followed by an SNMP request for TSM information to the targeted device. An exploit could allow the attacker to cause a DoS condition when the WLC unexpectedly restarts. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-1 Conditions: 1. The WLC is configured for SNMP and TSM data collection. 2. All versions of Cisco Wireless LAN Controller, from 6.x to 8.x, prior to the first fixed versions of 188.8.131.52, 184.108.40.206, and 220.127.116.11 are vulnerable.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases