Cisco on Wednesday issued a warning that its Wireless LAN Controller (Cisco WLC) products are affected by multiple security vulnerabilities that, if exploited, could enable an attacker to cause a denial-of-service condition, allow unauthorized access, or execute code remotely.
“The Cisco Wireless LAN Controller (WLC) product family is affected by a denial of service (DoS) vulnerability that could allow an unauthenticated, remote attacker to cause the device to reload by sending crafted IP packets to the affected device,” the security advisory noted. “This vulnerability affects Cisco WLCs that are configured with Wireless Intrusion Prevention System (wIPS). This vulnerability can be exploited from both wired and wireless segments.”
Cisco has released software updates that address the following vulnerabilities for the Cisco Wireless LAN Controller (Cisco WLC) product family:
• Cisco Wireless LAN Controllers Wireless Intrusion Prevention System (wIPS) Denial of Service Vulnerability (CVE-2013-1102)
• Cisco Wireless LAN Controllers Session Initiation Protocol Denial of Service Vulnerability (CVE-2013-1103)
• Cisco Wireless LAN Controllers HTTP Profiling Remote Code Execution Vulnerability (CVE-2013-1104)
• Cisco Wireless LAN Controllers SNMP Unauthorized Access Vulnerability (CVE-2013-1105)
Cisco is not aware of any malicious exploitation of the vulnerabilities that described in today’s advisory, and said that the DoS and remote code execution vulnerabilities were found during the troubleshooting of customer service requests, and credited Darren Johnson for discovering and reporting the SNMP unauthorized access vulnerability.
Cisco cautioned that customers should consult their maintenance providers or check the software for feature set compatibility and known issues that are specific to their environments before to deploying the updates.
Additional details are available from the Cisco security advisory (cisco-sa-20130123-wlc) page.