First published: Fri Sep 25 2015(Updated: )
The RADIUS functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.0(250.0) and 7.0(252.0) allows remote attackers to disconnect arbitrary sessions via crafted Disconnect-Request UDP packets, aka Bug ID CSCuw29419.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controller (WLC) Software | =7.0.250.0 | |
Cisco Wireless LAN Controller (WLC) Software | =7.0.252.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6302 is classified as a medium severity vulnerability affecting Cisco Wireless LAN Controllers.
To mitigate CVE-2015-6302, upgrade your Cisco Wireless LAN Controller firmware to a version later than 7.0(252.0).
CVE-2015-6302 affects Cisco Wireless LAN Controller devices running software versions 7.0(250.0) and 7.0(252.0).
Yes, CVE-2015-6302 allows remote attackers to disconnect arbitrary sessions using crafted Disconnect-Request UDP packets.
CVE-2015-6302 is associated with denial-of-service attacks, specifically targeting the RADIUS functionality of affected devices.