// For flags

CVE-2019-15276

Cisco Wireless LAN Controller HTTP Parsing Engine Denial of Service Vulnerability

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability in the web interface of Cisco Wireless LAN Controller Software could allow a low-privileged, authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists due to a failure of the HTTP parsing engine to handle specially crafted URLs. An attacker could exploit this vulnerability by authenticating with low privileges to an affected controller and submitting the crafted URL to the web interface of the affected device. Conversely, an unauthenticated attacker could exploit this vulnerability by persuading a user of the web interface to click the crafted URL. A successful exploit could allow the attacker to cause an unexpected restart of the device, resulting in a DoS condition.

Una vulnerabilidad en la interfaz web del Software Cisco Wireless LAN Controller, podría permitir a un atacante remoto, con poco privilegiado y autenticado, causar una condición de denegación de servicio (DoS) en un dispositivo afectado. La vulnerabilidad se presenta debido a un fallo del motor de análisis HTTP para manejar URL especialmente diseñadas. Un atacante podría explotar esta vulnerabilidad al autenticarse con pocos privilegios en un controlador afectado y enviar la URL diseñada a la interfaz web del dispositivo afectado. Por el contrario, un atacante no autenticado podría explotar esta vulnerabilidad al persuadir a un usuario de la interfaz web para cliquear sobre la URL creada. Una explotación con éxito podría permitir al atacante provocar un reinicio inesperado del dispositivo, conllevando a una condición de DoS.

Cisco WLC 2504 version 8.9 suffers from a denial of service vulnerability.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2019-08-20 CVE Reserved
  • 2019-11-26 CVE Published
  • 2019-12-04 First Exploit
  • 2024-11-04 EPSS Updated
  • 2024-11-21 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Wireless Lan Controller Software
Search vendor "Cisco" for product "Wireless Lan Controller Software"
>= 8.4 < 8.10
Search vendor "Cisco" for product "Wireless Lan Controller Software" and version " >= 8.4 < 8.10"
-
Affected