A vulnerability in the web management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a missing internal handler for the specific request. An attacker could exploit this vulnerability by accessing a specific hidden URL on the GUI web management interface. A successful exploit could allow the attacker to cause a reload of the device, resulting in a DoS condition. This vulnerability affects only the Cisco Wireless LAN Controller 8.3.102.0 release. Cisco Bug IDs: CSCvb48198.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97421 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038184 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-wlc3 | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2017-04-06T18:00:00
Updated: 2017-07-11T09:57:01
Reserved: 2016-12-21T00:00:00
Link: CVE-2017-3832
JSON object: View
NVD Information
Status : Analyzed
Published: 2017-04-06T18:59:00.293
Modified: 2021-11-08T19:46:52.540
Link: CVE-2017-3832
JSON object: View
Redhat Information
No data.