—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
Cisco Security Advisory: Cisco Wireless LAN Controller 802.11v Basic Service Set Transition Management Denial of Service Vulnerability
Advisory ID: cisco-sa-20171101-wlc2
Revision: 1.0
For Public Release: 2017 November 1 16:00 GMT
Last Updated: 2017 November 1 16:00 GMT
CVE ID(s): CVE-2017-12275
CVSS Score v(3): 7.4 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
+———————————————————————
Summary
=======
A vulnerability in the implementation of 802.11v Basic Service Set (BSS) Transition Management functionality in Cisco Wireless LAN Controllers could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.
The vulnerability is due to insufficient input validation of 802.11v BSS Transition Management Response packets that an affected device receives from wireless clients. An attacker could exploit this vulnerability by sending a malformed 802.11v BSS Transition Management Response packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload unexpectedly, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-wlc2 [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-wlc2”]
—–BEGIN PGP SIGNATURE—–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=2DDY
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com