Cisco Wireless LAN Controller (WLC) Software 8.9(1.52)

CPE Details

Cisco Wireless LAN Controller (WLC) Software 8.9(1.52)
8.9\(1.52\)
2019-01-30
18h45 +00:00
2021-04-15
14h25 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:o:cisco:wireless_lan_controller_software:8.9\(1.52\):*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

wireless_lan_controller_software

Version

8.9\(1.52\)

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-20268 2023-09-27 17h22 +00:00 A vulnerability in the packet processing functionality of Cisco access point (AP) software could allow an unauthenticated, adjacent attacker to exhaust resources on an affected device.  This vulnerability is due to insufficient management of resources when handling certain types of traffic. An attacker could exploit this vulnerability by sending a series of specific wireless packets to an affected device. A successful exploit could allow the attacker to consume resources on an affected device. A sustained attack could lead to the disruption of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel and intermittent loss of wireless client traffic.
4.7
Medium
CVE-2022-20769 2022-09-30 18h45 +00:00 A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error validation. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to cause the wireless LAN controller to crash, resulting in a DoS condition. Note: This vulnerability affects only devices that have Federal Information Processing Standards (FIPS) mode enabled.
7.4
High
CVE-2018-0416 2018-10-17 19h00 +00:00 A vulnerability in the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to view system information that under normal circumstances should be prohibited. The vulnerability is due to incomplete input and validation checking mechanisms in the web-based interface URL request. An attacker could exploit this vulnerability by requesting specific URLs via the web-based interface. A successful exploit could allow the attacker to view sensitive system information.
5.3
Medium