First published: Fri Nov 22 2013(Updated: )
The Control and Provisioning of Wireless Access Points (CAPWAP) protocol implementation on Cisco Wireless LAN Controller (WLC) devices allows remote attackers to cause a denial of service via a crafted CAPWAP packet that triggers a buffer over-read, aka Bug ID CSCuh81880.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controllers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6699 is classified as a high severity vulnerability due to its potential to cause denial of service.
To mitigate CVE-2013-6699, update your Cisco Wireless LAN Controller devices to the latest software version provided by Cisco.
CVE-2013-6699 affects Cisco Wireless LAN Controllers that use the CAPWAP protocol.
CVE-2013-6699 allows remote attackers to perform denial of service attacks by sending crafted CAPWAP packets.
Yes, CVE-2013-6699 can be exploited remotely by attackers targeting vulnerable Cisco Wireless LAN Controllers.