First published: Thu Jan 24 2013(Updated: )
Cisco Wireless LAN Controller (WLC) devices with software 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allow remote attackers to cause a denial of service (Access Point reload) via crafted SIP packets, aka Bug ID CSCts87659.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controller (WLC) Software | =7.0 | |
Cisco Wireless LAN Controller (WLC) Software | =7.0.98.0 | |
Cisco Wireless LAN Controller (WLC) Software | =7.1 | |
Cisco Wireless LAN Controller (WLC) Software | =7.2 | |
Cisco Wireless LAN Controller (WLC) Software | =7.3 | |
Cisco 2000 Wireless LAN Controller | ||
Cisco 2100 Wireless LAN Controller | ||
Cisco 2500 Wireless LAN Controller | ||
Cisco 4100 Wireless LAN Controller | ||
Cisco 4400 Wireless Lan Controller | ||
Cisco 5500 Wireless LAN Controller | ||
Cisco 7500 Wireless LAN Controller | ||
Cisco 8500 Wireless LAN Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1103 has been classified as a denial of service vulnerability that may allow remote attackers to cause an Access Point reload.
To fix CVE-2013-1103, upgrade your Cisco Wireless LAN Controller software to version 7.0.220.0, 7.1.91.0, or 7.2.103.0 or later.
CVE-2013-1103 affects various models of Cisco Wireless LAN Controllers including versions 7.0, 7.1, and 7.2.
Exploitations of CVE-2013-1103 can lead to a denial of service condition through crafted SIP packets.
Cisco does not recommend a specific workaround for CVE-2013-1103, thus upgrading to a fixed version is advised.