First published: Thu Apr 06 2017(Updated: )
A vulnerability in the web management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a missing internal handler for the specific request. An attacker could exploit this vulnerability by accessing a specific hidden URL on the GUI web management interface. A successful exploit could allow the attacker to cause a reload of the device, resulting in a DoS condition. This vulnerability affects only the Cisco Wireless LAN Controller 8.3.102.0 release. Cisco Bug IDs: CSCvb48198.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controller firmware | =8.3.102.0 | |
Cisco Wireless LAN Controller software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3832 is classified as a high severity vulnerability due to its potential to allow an unauthenticated remote attacker to cause a denial of service on affected devices.
To resolve CVE-2017-3832, upgrade to a fixed version of Cisco Wireless LAN Controller software as specified in Cisco’s security advisory.
The affected version for CVE-2017-3832 is Cisco Wireless LAN Controller firmware version 8.3.102.0.
There are no specific workarounds available for CVE-2017-3832; the recommended action is to upgrade the software.
Yes, CVE-2017-3832 can be exploited remotely by an unauthenticated attacker to achieve a denial of service condition.