First published: Wed Oct 17 2018(Updated: )
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper input validation on fields within CAPWAP Discovery Request packets by the affected device. An attacker could exploit this vulnerability by sending malicious CAPWAP Discovery Request packets to the Cisco WLC Software. A successful exploit could allow the attacker to cause the Cisco WLC Software to disconnect associated access points (APs). While the APs disconnect and reconnect, service will be unavailable for a brief period of time, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controller Software | =8.2\(151.0\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0443 is a vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software.
CVE-2018-0443 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
CVE-2018-0443 has a severity rating of 7.5 (high).
To fix CVE-2018-0443, it is recommended to upgrade to a patched version of Cisco Wireless LAN Controller (WLC) Software.
You can find more information about CVE-2018-0443 at the following references: [1] http://www.securityfocus.com/bid/105686 [2] http://www.securitytracker.com/id/1041922 [3] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-capwap-dos