First published: Wed May 07 2025(Updated: )
A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, adjacent wireless attacker to cause a denial of service (DoS) condition.This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of IPv6 network requests from an associated wireless IPv6 client to an affected device. To associate a client to a device, an attacker may first need to authenticate to the network, or associate freely in the case of a configured open network. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to stop responding, resulting in a DoS condition.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-wncd-p6Gvt6HLThis advisory is part of the May 2025 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: May 2025 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-wlc-wncd-p6Gvt6HL is classified as high due to the potential for denial of service attacks.
To fix cisco-sa-wlc-wncd-p6Gvt6HL, upgrade to the latest version of Cisco IOS XE Software as recommended in the security advisory.
Organizations using Cisco IOS XE Software for Wireless LAN Controllers are affected by cisco-sa-wlc-wncd-p6Gvt6HL.
The vulnerability cisco-sa-wlc-wncd-p6Gvt6HL is caused by improper memory management in the Wireless Network Control daemon (wncd).
Yes, cisco-sa-wlc-wncd-p6Gvt6HL can be exploited by an unauthenticated, adjacent wireless attacker.