#VU9088 Improper input validation in Cisco Wireless LAN Controller - CVE-2017-12275
Published: November 2, 2017 / Updated: July 20, 2018
Vulnerability identifier: #VU9088
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-12275
CWE-ID: CWE-20
Exploitation vector: Adjecent network
Exploit availability:
No public exploit available
Vulnerable software:
Cisco Wireless LAN Controller
Cisco Wireless LAN Controller
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allows an adjacent attacker to cause DoS condition on the target system.
The weakness exists in the implementation of 802.11v Basic Service Set (BSS) Transition Management functionality in Cisco Wireless LAN Controllers due to insufficient input validation of 802.11v BSS Transition Management Response packets that an affected device receives from wireless clients. An adjacent attacker can send a malformed 802.11v BSS Transition Management Response packet and cause the device to reload.
Successful exploitation of the vulnerability results in denial of service.
The weakness exists in the implementation of 802.11v Basic Service Set (BSS) Transition Management functionality in Cisco Wireless LAN Controllers due to insufficient input validation of 802.11v BSS Transition Management Response packets that an affected device receives from wireless clients. An adjacent attacker can send a malformed 802.11v BSS Transition Management Response packet and cause the device to reload.
Successful exploitation of the vulnerability results in denial of service.
Remediation
Install update from vendor's website (8.0.152.0, 8.2.164.0, 8.3.132.0, 8.4.100.0).