A vulnerability in the web management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a missing internal handler for the specific request. An attacker could exploit this vulnerability by accessing a specific hidden URL on the GUI web management interface. A successful exploit could allow the attacker to cause a reload of the device, resulting in a DoS condition. This vulnerability affects only the Cisco Wireless LAN Controller 8.3.102.0 release. Cisco Bug IDs: CSCvb48198.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97421 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038184 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-wlc3 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
08 Nov 2021, 19:46
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:cisco:wireless_lan_controller_firmware:8.3.102.0:*:*:*:*:*:*:* | |
References | (SECTRACK) http://www.securitytracker.com/id/1038184 - Third Party Advisory, VDB Entry |
Information
Published : 2017-04-06 18:59
Updated : 2024-02-04 19:11
NVD link : CVE-2017-3832
Mitre link : CVE-2017-3832
CVE.ORG link : CVE-2017-3832
JSON object : View
Products Affected
cisco
- wireless_lan_controller
- wireless_lan_controller_firmware