|
|
|
|
| |
Credit:
The information has been provided by psirt@cisco.com.
The original article can be found at: http://www.cisco.com/warp/public/707/cisco-sa-20090727-wlc.shtml
|
| |
Vulnerable Systems:
* Cisco 1500 Series,
* Cisco 2000 Series,
* Cisco 2100 Series,
* Cisco 4400 Series,
* Cisco 4100 Series,
* Cisco 4200 Series,
* Cisco Wireless Services Modules (WiSM),
* Cisco WLC Modules for Integrated Services Routers,
* Cisco Catalyst 3750G Integrated Wireless LAN Controllers
Immune Systems:
* Cisco Wireless Controller 5500 Series
Successful exploitation of the denial of service (DoS) vulnerabilities may cause the affected device to reload. Repeated exploitation could result in a sustained DoS condition.
An unauthenticated, remote attacker may be able to use the unauthorized configuration modification vulnerability to gain full control over the Wireless LAN Controller if the attacker is able to submit a crafted request directly to an administrative interface of the affected device.
To determine the WLC version that is running in a given environment, use one of the following methods:
* In the web interface, choose the Monitor tab, click Summary in
the left pane, and note the Software Version field.
Note: Customers who use a WLC Module in an Integrated Services
Router (ISR) will need to issue the service-module
wlan-controller 1/0 session command prior to performing the next
step on the command line. Customers who use a Cisco Catalyst
3750G Switch with an integrated WLC Module will need to issue the
session processor 1 session command prior
to performing the next step on the command line.
* From the command-line interface, type show sysinfo and note the
Product Version field, as shown in the following example:
(Cisco Controller) >show sysinfo
Manufacturer's Name.. Cisco Systems Inc.
Product Name......... Cisco Controller
Product Version...... 5.1.151.0
RTOS Version......... Linux-2.6.10_mvl401
Bootloader Version... 4.0.207.0
Build Type........... DATA + WPS
|
|
|
|
|