Tag Archives: Cisco Wireless Lan Controller

Cisco Releases Large Group of Security Advisories

On Wednesday of last week Cisco issued five security advisories addressing 1x critical vulnerability and 4x high severity vulnerabilities.

Why Should This Issue Be Considered Important?
The most severe of these issues (due to the ease of exploitation) could allow an unauthenticated remote attacker (namely a user with no prior access to your corporate network) to carry out a denial of service issue (defined) of the Cisco Wireless LAN Controller (WLC) Software as a result of a buffer overflow (defined).

All (but one) of the other issues can also be exploited by sending specifically crafted packets (defined below) to the software/system resulting in a denial of service issue. The remaining high severity issue involves an attacker accessing normally inaccessible URLs from within the management interface of the Cisco Wireless LAN Controller (WLC) again resulting in a potential denial of service issue.

Workarounds are available for 2 of the above security issues, detailed here and here.

The affected products are as follows:
=======================
Critical issue:
Cisco WLC Software of the following versions:

  • All 7.2 releases
  • All 7.3 releases
  • All 7.4 releases prior to 7.4.140.0(MD)
  • All 7.5 releases
  • All 7.6 releases
  • All 8.0 releases prior to 8.0.115.0(ED)

=======================
High severity issues:
=======================
Issue 1:
Cisco ASA Software running on the following products:

  • Cisco ASA 5500-X Series Next-Generation Firewalls
  • Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers
  • Cisco Adaptive Security Virtual Appliance (ASAv)

Steps to check if your Cisco ASA Software in its current configuration is vulnerable are provided within this advisory.
=======================
Issue 2:
Cisco WLC Software of the following versions:

  • All 7.4 releases prior to 7.4.130.0(MD)
  • All 7.5 releases
  • All 7.6 releases
  • All 8.0 releases prior to 8.0.110.0(ED)

=======================
Issue 3:
For the full list please refer to the relevant security advisory.

=======================
Issue 4:
Cisco WLC devices running the following releases of Cisco AireOS Software are vulnerable:

  • Releases 4.1 through 7.4.120.0
  • All 7.5 releases
  • Release 7.6.100.0

=======================

How Can I Protect Myself From These Issues?
If your organization uses any of the above mentioned software products, please follow the directions within the 5 Cisco security advisories mentioned below to install the necessary security updates:

Critical Severity:
Cisco Wireless LAN Controller HTTP Parsing Denial of Service Vulnerability

High Severity:
Cisco Adaptive Security Appliance Software DHCPv6 Relay Denial of Service Vulnerability

Cisco Wireless LAN Controller Denial of Service Vulnerability

Multiple Cisco Products libSRTP Denial of Service Vulnerability

Cisco Wireless LAN Controller Management Interface Denial of Service Vulnerability

Thank you.

=======================
Aside:
What is a packet (in the context of computer networking)?
This is the name given to the most fundamental components of a MAC (Media Access Control)(defined) frame. With the outer enclosing MAC frame removed from the data units sent over a network connection, what you are left with is called a packet.
=======================