The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Cisco Wireless Controller

vulnerability announce CVE-2019-1796 CVE-2019-1799 CVE-2019-1800

Cisco Wireless LAN Controller: denial of service via IAPP Message

Synthesis of the vulnerability

An attacker can trigger a fatal error via IAPP Message of Cisco Wireless LAN Controller, in order to trigger a denial of service.
Impacted products: Cisco Wireless Controller.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: radio connection.
Number of vulnerabilities in this bulletin: 3.
Creation date: 18/04/2019.
Identifiers: CERTFR-2019-AVI-181, cisco-sa-20190417-wlc-iapp, CSCvh91032, CSCvh96364, CSCvi89027, CVE-2019-1796, CVE-2019-1799, CVE-2019-1800, VIGILANCE-VUL-29092.

Description of the vulnerability

An attacker can trigger a fatal error via IAPP Message of Cisco Wireless LAN Controller, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2018-0248

Cisco Wireless LAN Controller: denial of service via GUI Configuration

Synthesis of the vulnerability

An attacker can trigger a fatal error via GUI Configuration of Cisco Wireless LAN Controller, in order to trigger a denial of service.
Impacted products: Cisco Wireless Controller.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: user account.
Creation date: 18/04/2019.
Identifiers: CERTFR-2019-AVI-181, cisco-sa-20190417-wlc-gui, CVE-2018-0248, VIGILANCE-VUL-29091.

Description of the vulnerability

An attacker can trigger a fatal error via GUI Configuration of Cisco Wireless LAN Controller, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2019-1797

Cisco Wireless LAN Controller: Cross Site Request Forgery

Synthesis of the vulnerability

An attacker can trigger a Cross Site Request Forgery of Cisco Wireless LAN Controller, in order to force the victim to perform operations.
Impacted products: Cisco Wireless Controller.
Severity: 2/4.
Consequences: user access/rights.
Provenance: internet client.
Creation date: 18/04/2019.
Identifiers: CERTFR-2019-AVI-181, cisco-sa-20190417-wlc-csrf, CSCvj06910, CVE-2019-1797, VIGILANCE-VUL-29090.

Description of the vulnerability

An attacker can trigger a Cross Site Request Forgery of Cisco Wireless LAN Controller, in order to force the victim to perform operations.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2019-1830

Cisco Wireless LAN Controller: denial of service via Locally Significant Certificate

Synthesis of the vulnerability

An attacker can trigger a fatal error via Locally Significant Certificate of Cisco Wireless LAN Controller, in order to trigger a denial of service.
Impacted products: Cisco Wireless Controller.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: user account.
Creation date: 18/04/2019.
Identifiers: cisco-sa-20190417-wlc-cert-dos, CSCvj07995, CVE-2019-1830, VIGILANCE-VUL-29089.

Description of the vulnerability

An attacker can trigger a fatal error via Locally Significant Certificate of Cisco Wireless LAN Controller, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2018-0382

Cisco Wireless LAN Controller: privilege escalation via Session Identification Management

Synthesis of the vulnerability

An attacker can bypass restrictions via Session Identification Management of Cisco Wireless LAN Controller, in order to escalate his privileges.
Impacted products: Cisco Wireless Controller.
Severity: 2/4.
Consequences: privileged access/rights, user access/rights.
Provenance: radio connection.
Creation date: 18/04/2019.
Identifiers: cisco-sa-20190417-wlan-hijack, CSCvi25569, CVE-2018-0382, VIGILANCE-VUL-29088.

Description of the vulnerability

An attacker can bypass restrictions via Session Identification Management of Cisco Wireless LAN Controller, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability bulletin CVE-2018-0420

Cisco Wireless LAN Controller: directory traversal via HTTP Request Parameters

Synthesis of the vulnerability

An attacker can traverse directories via HTTP Request Parameters of Cisco Wireless LAN Controller, in order to read a file outside the service root path.
Impacted products: Cisco Wireless Controller.
Severity: 2/4.
Consequences: data reading.
Provenance: user account.
Creation date: 18/10/2018.
Identifiers: CERTFR-2018-AVI-502, cisco-sa-20181017-wlc-traversal, CSCvf66723, CVE-2018-0420, VIGILANCE-VUL-27568.

Description of the vulnerability

An attacker can traverse directories via HTTP Request Parameters of Cisco Wireless LAN Controller, in order to read a file outside the service root path.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2018-0416

Cisco Wireless LAN Controller: information disclosure via Web URL

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via Web URL of Cisco Wireless LAN Controller, in order to obtain sensitive information.
Impacted products: Cisco Wireless Controller.
Severity: 2/4.
Consequences: data reading.
Provenance: radio connection.
Creation date: 18/10/2018.
Identifiers: CERTFR-2018-AVI-502, cisco-sa-20181017-wlc-id, CSCvj95336, CVE-2018-0416, VIGILANCE-VUL-27567.

Description of the vulnerability

An attacker can bypass access restrictions to data via Web URL of Cisco Wireless LAN Controller, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-0417

Cisco Wireless LAN Controller: privilege escalation via TACACS GUI

Synthesis of the vulnerability

An attacker can bypass restrictions via TACACS GUI of Cisco Wireless LAN Controller, in order to escalate his privileges.
Impacted products: Cisco Wireless Controller.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user account.
Creation date: 18/10/2018.
Identifiers: CERTFR-2018-AVI-502, cisco-sa-20181017-wlc-gui-privesc, CSCvh65876, CVE-2018-0417, VIGILANCE-VUL-27566.

Description of the vulnerability

An attacker can bypass restrictions via TACACS GUI of Cisco Wireless LAN Controller, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability CVE-2018-0442

Cisco Wireless LAN Controller: information disclosure via CAPWAP

Synthesis of the vulnerability

A local attacker can read a memory fragment via CAPWAP of Cisco Wireless LAN Controller, in order to obtain sensitive information.
Impacted products: Cisco Wireless Controller.
Severity: 3/4.
Consequences: data reading.
Provenance: LAN.
Creation date: 18/10/2018.
Identifiers: CERTFR-2018-AVI-502, cisco-sa-20181017-wlc-capwap-memory-leak, CSCvf66680, CVE-2018-0442, VIGILANCE-VUL-27565.

Description of the vulnerability

A local attacker can read a memory fragment via CAPWAP of Cisco Wireless LAN Controller, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2018-0443

Cisco Wireless LAN Controller: denial of service via CAPWAP

Synthesis of the vulnerability

An attacker can generate a fatal error via CAPWAP of Cisco Wireless LAN Controller, in order to trigger a denial of service.
Impacted products: Cisco Wireless Controller.
Severity: 2/4.
Consequences: denial of service on server, denial of service on service.
Provenance: radio connection.
Creation date: 18/10/2018.
Identifiers: CERTFR-2018-AVI-502, cisco-sa-20181017-wlc-capwap-dos, CSCvf66696, CVE-2018-0443, VIGILANCE-VUL-27564.

Description of the vulnerability

An attacker can generate a fatal error via CAPWAP of Cisco Wireless LAN Controller, in order to trigger a denial of service.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Cisco Wireless Controller: