Information disclosure in Cisco Wireless LAN Controller - CVE-2018-0442

 

Information disclosure in Cisco Wireless LAN Controller - CVE-2018-0442

Published: October 18, 2018


Vulnerability identifier: #VU15411
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0442
CWE-ID: CWE-200
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Wireless LAN Controller

Detailed vulnerability description

The vulnerability allows a remote attacker to obtain potentially sensitive information.

The weakness exists in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software due to insufficient condition checks in the part of the code that handles CAPWAP keepalive requests. A remote attacker can send a specially crafted CAPWAP keepalive packet to a vulnerable Cisco WLC device, retrieve the contents of device memory, which can lead to the disclosure of confidential information.


How to mitigate CVE-2018-0442

The vulnerability has been addressed in the versions 8.7(102.0), 8.7(1.14), 8.6(101.0), 8.6(1.103), 8.5(110.0), 8.5(107.59), 8.3(140.0), 8.3(134.67), 8.2(170.0), 8.2(167.207), 8.2(167.8), 8.0(154.2).

Sources