Multiple vulnerabilities exist in the Cisco Wireless LAN Controllers (WLCs), Cisco Catalyst 6500 Wireless Services Modules (WiSMs), and Cisco Catalyst 3750 Integrated Wireless LAN Controllers. This security advisory outlines details of the following vulnerabilities:
- Denial of Service Vulnerabilities (total of three)
- Privilege Escalation Vulnerability
These vulnerabilities are independent of each other.
Two denial of service (DoS) vulnerabilities affect software versions 4.1 and later. All Cisco Wireless LAN Controller (WLC) platforms are affected.
A third DoS vulnerability affects software versions 4.1 and later. The following platforms are affected by this vulnerability:
- Cisco 4400 Series Wireless LAN Controllers
- Cisco Catalyst 6500 Series/7600 Series Wireless Services Module (WiSM)
- Cisco Catalyst 3750 Series Integrated Wireless LAN Controllers
Cisco Wireless LAN Controllers (WLCs), Cisco Catalyst 6500 Wireless Services Modules (WiSMs), and Cisco Catalyst 3750 Integrated Wireless LAN Controllers are responsible for system-wide wireless LAN functions, such as security policies, intrusion prevention, RF management, quality of service (QoS), and mobility.
These devices communicate with Controller-based Access Points over any Layer 2 (Ethernet) or Layer 3 (IP) infrastructure using the Lightweight Access Point Protocol (LWAPP).
This Security Advisory describes multiple distinct vulnerabilities in the WLCs, WiSMs, and the Cisco Catalyst 3750 Integrated WLCs. These vulnerabilities are independent of each other.
Successful exploitation of the denial of service vulnerabilities may cause the affected device to hang or reload. Repeated exploitation could result in a sustained DoS condition. The privilege escalation vulnerability may allow an authenticated user to obtain full administrative rights on the affected system.