First published: Wed Dec 19 2012(Updated: )
screens/base/web_auth_custom.html on Cisco Wireless LAN Controller (WLC) devices with software 7.2.110.0 allows remote authenticated users to cause a denial of service (device reload) via a certain buttonClicked value in an internal webauth_type request, aka Bug ID CSCud50209.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controller (WLC) Software | =7.2.110.0 | |
Cisco 2000 Wireless LAN Controller | ||
Cisco 2100 Wireless LAN Controller | ||
Cisco 2500 Wireless LAN Controller | ||
Cisco 4100 Wireless LAN Controller | ||
Cisco 4400 Wireless Lan Controller | ||
Cisco 5500 Wireless LAN Controller | ||
Cisco 7500 Wireless LAN Controller | ||
Cisco 8500 Wireless LAN Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5991 is classified as a denial of service vulnerability that can cause device reloads.
To mitigate CVE-2012-5991, upgrade to a software version higher than Cisco Wireless LAN Controller software 7.2.110.0.
CVE-2012-5991 affects various models of Cisco Wireless LAN Controllers running software version 7.2.110.0 and older.
CVE-2012-5991 allows remote authenticated users to conduct denial of service attacks against the affected Cisco devices.
Yes, CVE-2012-5991 is a remote vulnerability that can be exploited by authenticated users.