First published: Wed Apr 17 2019(Updated: )
A vulnerability in Locally Significant Certificate (LSC) management for the Cisco Wireless LAN Controller (WLC) could allow an authenticated, remote attacker to cause the device to unexpectedly restart, which causes a denial of service (DoS) condition. The attacker would need to have valid administrator credentials. The vulnerability is due to incorrect input validation of the HTTP URL used to establish a connection to the LSC Certificate Authority (CA). An attacker could exploit this vulnerability by authenticating to the targeted device and configuring a LSC certificate. An exploit could allow the attacker to cause a DoS condition due to an unexpected restart of the device. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlc-cert-dos
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controllers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190417-wlc-cert-dos is rated as high due to its potential to cause a denial of service condition.
To fix cisco-sa-20190417-wlc-cert-dos, Cisco recommends updating to the latest firmware version for the Wireless LAN Controller.
Any organization using the Cisco Wireless LAN Controller with Locally Significant Certificate management is affected by cisco-sa-20190417-wlc-cert-dos.
cisco-sa-20190417-wlc-cert-dos involves an authenticated remote attack that can lead to an unexpected restart of the device.
The impact of cisco-sa-20190417-wlc-cert-dos is a denial of service condition that disrupts the normal operation of the Wireless LAN Controller.