A vulnerability with IPv6 UDP ingress packet processing in Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause an unexpected reload of the device. The vulnerability is due to incomplete IPv6 UDP header validation. An attacker could exploit this vulnerability by sending a crafted IPv6 UDP packet to a specific port on the targeted device. An exploit could allow the attacker to impact the availability of the device as it could unexpectedly reload. This vulnerability affects Cisco Wireless LAN Controller (WLC) running software version 8.2.121.0 or 8.3.102.0. Cisco Bug IDs: CSCva98592.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: cisco

Published: 2017-04-06T18:00:00

Updated: 2017-07-11T09:57:01

Reserved: 2016-11-06T00:00:00


Link: CVE-2016-9219

JSON object: View

cve-icon NVD Information

Status : Modified

Published: 2017-04-06T18:59:00.260

Modified: 2021-04-16T17:27:00.030


Link: CVE-2016-9219

JSON object: View

cve-icon Redhat Information

No data.

CWE