HTTP DoS Vulnerability in Cisco Wireless LAN Controllers

medium Nessus Plugin ID 71173

Synopsis

The remote device is missing a vendor-supplied security update.

Description

The remote Cisco Wireless LAN Controller (WLC) is affected by a denial of service vulnerability related to handling HTTP requests containing unspecified configuration parameters.

Solution

Upgrade to 7.6(1.120), 8.0(72.64), or later.

See Also

http://www.nessus.org/u?ba1e831f

https://tools.cisco.com/security/center/viewAlert.x?alertId=31743

Plugin Details

Severity: Medium

ID: 71173

File Name: cisco-CSCuh81011-wlc.nasl

Version: 1.6

Type: combined

Family: CISCO

Published: 12/3/2013

Updated: 8/20/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:S/C:N/I:N/A:C

Vulnerability Information

CPE: cpe:/o:cisco:wireless_lan_controller_software, cpe:/h:cisco:wireless_lan_controller

Required KB Items: Host/Cisco/WLC/Version, Host/Cisco/WLC/Model, Host/Cisco/WLC/Port

Exploit Ease: No known exploits are available

Patch Publication Date: 11/12/2013

Vulnerability Publication Date: 11/12/2013

Reference Information

CVE: CVE-2013-6684

BID: 63684

CISCO-BUG-ID: CSCuh81011