Cisco Wireless LAN Controller (WLC) Software 8.10.151.0

CPE Details

Cisco Wireless LAN Controller (WLC) Software 8.10.151.0
8.10.151.0
2021-03-29
15h00 +00:00
2021-04-15
14h08 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:cisco:wireless_lan_controller_software:8.10.151.0:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

wireless_lan_controller_software

Version

8.10.151.0

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-20268 2023-09-27 17h22 +00:00 A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to exhaust resources on an affected device.  This vulnerability is due to insufficient management of resources when handling certain types of traffic. An attacker could exploit this vulnerability by sending a series of specific wireless packets to an affected device. A successful exploit could allow the attacker to consume resources on an affected device. A sustained attack could lead to the disruption of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel and intermittent loss of wireless client traffic.
4.7
Medium
CVE-2022-20769 2022-09-30 18h45 +00:00 A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error validation. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to cause the wireless LAN controller to crash, resulting in a DoS condition. Note: This vulnerability affects only devices that have Federal Information Processing Standards (FIPS) mode enabled.
7.4
High