// For flags

CVE-2019-1800

Cisco Wireless LAN Controller Software IAPP Message Handling Denial of Service Vulnerabilities

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerability by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. Software versions prior to 8.2.170.0, 8.5.150.0, and 8.8.100.0 are affected.

Una vulnerabilidad en el manejo de los mensajes de Inter-Access Point Protocol (IAPP) por parte del programa Wireless LAN Controller (WLC) de Cisco, podría permitir que un atacante adyacente no autenticado cause una condición de denegación de servicio (DoS). La vulnerabilidad existe porque el programa valida incorrectamente la entrada en los campos dentro de los mensajes IAPP. Un atacante podría explotar la vulnerabilidad enviando mensajes IAPP maliciosos a un dispositivo afectado. Una explotación con éxito podría permitir al atacante hacer que el programa WLC de Cisco se vuelva a cargar, lo que resultaría en una condición DoS. Las versiones de software anteriores a 8.2.170.0, 8.5.150.0 y 8.8.100.0 están afectadas.

*Credits: N/A
CVSS Scores
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Adjacent
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-04-18 CVE Published
  • 2024-09-07 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-399: Resource Management Errors
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Wireless Lan Controller
Search vendor "Cisco" for product "Wireless Lan Controller"
< 8.2.170.0
Search vendor "Cisco" for product "Wireless Lan Controller" and version " < 8.2.170.0"
-
Affected
Cisco
Search vendor "Cisco"
Wireless Lan Controller Software
Search vendor "Cisco" for product "Wireless Lan Controller Software"
>= 8.3 < 8.5.150.0
Search vendor "Cisco" for product "Wireless Lan Controller Software" and version " >= 8.3 < 8.5.150.0"
-
Affected
Cisco
Search vendor "Cisco"
Wireless Lan Controller Software
Search vendor "Cisco" for product "Wireless Lan Controller Software"
>= 8.6 < 8.8.100.0
Search vendor "Cisco" for product "Wireless Lan Controller Software" and version " >= 8.6 < 8.8.100.0"
-
Affected