Cisco 5520 Wireless LAN Controller

CPE Details

Cisco 5520 Wireless LAN Controller
-
2020-10-29
16h31 +00:00
2020-10-29
16h31 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:cisco:5520_wireless_lan_controller:-:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

5520_wireless_lan_controller

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-20769 2022-09-30 18h45 +00:00 A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error validation. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to cause the wireless LAN controller to crash, resulting in a DoS condition. Note: This vulnerability affects only devices that have Federal Information Processing Standards (FIPS) mode enabled.
7.4
High
CVE-2019-15262 2019-10-16 18h36 +00:00 A vulnerability in the Secure Shell (SSH) session management for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists because the SSH process is not properly deleted when an SSH connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly opening SSH connections to an affected device. A successful exploit could allow the attacker to exhaust system resources by initiating multiple SSH connections to the device that are not effectively terminated, which could result in a DoS condition.
7.5
High