![]() ![]() For a complete list of the advisories and links to them, see Cisco Event Response: April 2020 Cisco Aironet AP, Mobility Express and WLC Software Security Advisory Bundled Publication. This advisory is part of the April 2020 Cisco Aironet AP, Mobility Express, and WLC Software Security Advisory Bundled Publication, which includes four Cisco Security Advisories that describe four vulnerabilities. This advisory is available at the following link: There are no workarounds that address this vulnerability. A successful exploit could allow the attacker to trigger a restart of an affected device, resulting in a DoS condition.Ĭisco has released software updates that address this vulnerability. An attacker could exploit this vulnerability by sending a malformed CAPWAP packet to an affected device. ![]() ![]() For those of you who like to lab, like myself, but always have difficulty getting your hands on a WLC, this may. Your first thought might be less hardware cost and a WLC can take all the advantages of being a VM. The vulnerability is due to insufficient validation of received CAPWAP packets. Cisco has released a Virtual Wireless LAN Controller (vWLC), a VM version of a controller that has always been an appliance or hardware module, with 60-day evaluation at installation. A vulnerability in the Control And Provisioning of Wireless Access Points (CAPWAP) protocol handler of Cisco Wireless LAN Controller (WLC) software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |