A vulnerability in the web management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a missing internal handler for the specific request. An attacker could exploit this vulnerability by accessing a specific hidden URL on the GUI web management interface. A successful exploit could allow the attacker to cause a reload of the device, resulting in a DoS condition. This vulnerability affects only the Cisco Wireless LAN Controller 8.3.102.0 release. Cisco Bug IDs: CSCvb48198.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-wlc3 | Vendor Advisory |
http://www.securityfocus.com/bid/97421 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038184 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2017-04-06 11:59
Updated : 2021-11-08 11:46
NVD link : CVE-2017-3832
Mitre link : CVE-2017-3832
JSON object : View
CWE
CWE-755
Improper Handling of Exceptional Conditions
Products Affected
cisco
- wireless_lan_controller
- wireless_lan_controller_firmware