Cisco Wireless LAN Controller RADIUS Packet of Disconnect Vulnerability
|
Información sobre el sistema
|
|
|
Software afectado |
Cisco |
Descripción
|
A vulnerability in the RADIUS implementation of the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition by disconnecting user sessions.The vulnerability is due to a lack of proper input validation of the RADIUS Disconnect-Request packet. An attacker could exploit this vulnerability by sending crafted RADIUS UDP Disconnect-Request packets to the affected device. An exploit could allow the attacker to cause a
More info:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/Cisco-SA-20150921-CVE-2015-6302?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20Wireless%20LAN%20Controller%20RADIUS%20Packet%20of%20Disconn |
Identificadores estándar
|
Propiedad |
Valor |
CVE |
|