First published: Thu Nov 02 2017(Updated: )
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco Wireless LAN Controllers could allow an authenticated, remote attacker to cause an affected device to restart, resulting in a denial of service (DoS) condition. The vulnerability is due to a memory leak that occurs on an affected device after the device fails to deallocate a buffer that is used when certain MIBs are polled. An attacker who knows the SNMP Version 2 SNMP Read string or has valid SNMP Version 3 credentials for an affected device could repeatedly poll the affected MIB object IDs (OIDs) and consume available memory on the device. When memory is sufficiently depleted on the device, the device will restart, resulting in a DoS condition. Cisco Bug IDs: CSCvc71674.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controller Software | ||
Cisco Wireless LAN Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-12278 is medium with a CVSS score of 6.3.
CVE-2017-12278 can cause an authenticated, remote attacker to restart an affected Cisco Wireless LAN Controller, resulting in a denial of service (DoS) condition.
CVE-2017-12278 is caused by a memory leak in the Simple Network Management Protocol (SNMP) subsystem of Cisco Wireless LAN Controllers.
Yes, Cisco Wireless LAN Controller Software is affected by CVE-2017-12278.
Apply the necessary updates or patches provided by Cisco to fix CVE-2017-12278.