First published: Thu Jan 24 2013(Updated: )
Cisco Wireless LAN Controller (WLC) devices with software 7.0 before 7.0.235.3, 7.1 and 7.2 before 7.2.111.3, and 7.3 before 7.3.101.0 allow remote authenticated users to bypass wireless-management settings and read or modify the device configuration via an SNMP request, aka Bug ID CSCua60653.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controllers | =7.0 | |
Cisco Wireless LAN Controllers | =7.0.98.0 | |
Cisco Wireless LAN Controllers | =7.0.220.0 | |
Cisco Wireless LAN Controllers | =7.1 | |
Cisco Wireless LAN Controllers | =7.2 | |
Cisco Wireless LAN Controllers | =7.2.103.0 | |
Cisco Wireless LAN Controllers | =7.2.110.0 | |
Cisco Wireless LAN Controllers | =7.3 | |
Cisco 2500 Wireless LAN Controller | ||
Cisco 2100 Wireless LAN Controller | ||
Cisco 2500 Wireless LAN Controller | ||
Cisco 5500 Wireless LAN Controller | ||
Cisco 7500 Wireless LAN Controller | ||
Cisco 8500 Wireless LAN Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1105 has been rated as a high severity vulnerability due to the ability of remote authenticated users to exploit it.
To mitigate CVE-2013-1105, upgrade your Cisco Wireless LAN Controller software to versions 7.0.235.3, 7.2.111.3, or 7.3.101.0 or later.
CVE-2013-1105 affects Cisco Wireless LAN Controller devices running specific versions of software 7.0, 7.1, 7.2, and 7.3.
Yes, CVE-2013-1105 can be exploited remotely by authenticated users through SNMP requests.
CVE-2013-1105 allows attackers to bypass wireless-management settings and potentially modify the device configuration.