First published: Thu Feb 05 2009(Updated: )
The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.2 allow remote attackers to cause a denial of service (web authentication outage or device reload) via unspecified network traffic, as demonstrated by a vulnerability scanner.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controllers | =4.2 | |
Cisco Catalyst 6500 Series Integrated Wireless LAN Controller | =5.2 | |
Cisco Wireless LAN Controllers | =4.1 | |
Cisco Catalyst 3750 series Integrated Wireless LAN Controller | =4.1 | |
Cisco Catalyst 7600 series Wireless LAN Controller | =5.2 | |
Cisco Catalyst 7600 series Wireless LAN Controller | =4.2 | |
Cisco Catalyst 6500 Series Integrated Wireless LAN Controller | =4.1 | |
Cisco Wireless LAN Controllers | =5.2 | |
Cisco Catalyst 7600 series Wireless LAN Controller | =4.1 | |
Cisco 4400 Wireless LAN Controller | =4.1 | |
Cisco Catalyst 3750 series Integrated Wireless LAN Controller | =4.2 | |
Cisco 4400 Wireless LAN Controller | =5.2 | |
Cisco Catalyst 3750 series Integrated Wireless LAN Controller | =5.2 | |
Cisco Catalyst 6500 Series Integrated Wireless LAN Controller | =4.2 | |
Cisco 4400 Wireless LAN Controller | =4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2009-0058 is classified as high due to its potential to cause a denial of service.
To fix CVE-2009-0058, upgrade the Cisco Wireless LAN Controller and associated devices to software version 4.2.176.0 or later for the 4.x branch and 5.2 or later for the 5.x branch.
CVE-2009-0058 affects Cisco Wireless LAN Controllers, Cisco Catalyst 6500, and Catalyst 3750 Integrated Wireless LAN Controllers running specific vulnerable software versions.
Yes, CVE-2009-0058 can be exploited by remote attackers, leading to service outages in network infrastructure.
There are no official workarounds for CVE-2009-0058; upgrading to a secure version is recommended.