Improper input validation in Cisco 5500 Series Wireless Controllers - CVE-2018-0235

 

Improper input validation in Cisco 5500 Series Wireless Controllers - CVE-2018-0235

Published: May 7, 2018


Vulnerability identifier: #VU12374
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0235
CWE-ID: CWE-20
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco 5500 Series Wireless Controllers

Detailed vulnerability description

The vulnerability allows an adjacent unauthenticated attacker to cause DoS condition on the target system.

The weakness exists in the 802.11 frame validation functionality due to incomplete input validation of certain 802.11 management information element frames that an affected device receives from wireless clients. An adjacent attacker can send a specially crafted 802.11 management frame and cause the service to crash.


How to mitigate CVE-2018-0235

Update to versions 8.7(102.0), 8.7(1.35), 8.6(101.0), 8.6(1.132), 8.5(110.0) or 8.5(107.62).

Sources