cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-20251,https://securityvulnerability.io/vulnerability/CVE-2023-20251,Memory Leak Vulnerability in Cisco Wireless LAN Controller AireOS Software,"A memory leak vulnerability exists in the Cisco Wireless LAN Controller (WLC) AireOS Software, where an adjacent unauthenticated attacker can exploit this weakness by causing multiple clients to connect to an access point. Under specific conditions, this can lead to memory leaks and may ultimately result in the affected device rebooting. This behavior creates a denial of service (DoS) scenario, significantly impacting the availability of the services provided by the device.",Cisco,"Cisco Wireless LAN Controller (WLC),Cisco Mobility Express",5.3,MEDIUM,0.0004400000034365803,false,,false,false,false,,,false,false,,2023-09-27T18:15:00.000Z,0 CVE-2022-20769,https://securityvulnerability.io/vulnerability/CVE-2022-20769,Cisco Wireless LAN Controller AireOS Software FIPS Mode Denial of Service Vulnerability,"A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) AireOS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error validation. An attacker could exploit this vulnerability by sending crafted packets to an affected device. A successful exploit could allow the attacker to cause the wireless LAN controller to crash, resulting in a DoS condition. Note: This vulnerability affects only devices that have Federal Information Processing Standards (FIPS) mode enabled.",Cisco,Cisco Wireless Lan Controller (wlc),7.4,HIGH,0.0005000000237487257,false,,false,false,true,2024-08-03T03:15:40.000Z,,false,false,,2022-09-30T19:15:00.000Z,0 CVE-2022-20695,https://securityvulnerability.io/vulnerability/CVE-2022-20695,Cisco Wireless LAN Controller Management Interface Authentication Bypass Vulnerability,"A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to bypass authentication controls and log in to the device through the management interface This vulnerability is due to the improper implementation of the password validation algorithm. An attacker could exploit this vulnerability by logging in to an affected device with crafted credentials. A successful exploit could allow the attacker to bypass authentication and log in to the device as an administrator. The attacker could obtain privileges that are the same level as an administrative user but it depends on the crafted credentials. Note: This vulnerability exists because of a non-default device configuration that must be present for it to be exploitable. For details about the vulnerable configuration, see the Vulnerable Products section of this advisory.",Cisco,Cisco Wireless Lan Controller (wlc),10,CRITICAL,0.00698000006377697,false,,false,false,true,2024-08-03T03:15:37.000Z,,false,false,,2022-04-15T15:15:00.000Z,0 CVE-2021-1419,https://securityvulnerability.io/vulnerability/CVE-2021-1419,Cisco Access Points SSH Management Privilege Escalation Vulnerability,"A vulnerability in the SSH management feature of multiple Cisco Access Points (APs) platforms could allow a local, authenticated user to modify files on the affected device and possibly gain escalated privileges. The vulnerability is due to improper checking on file operations within the SSH management interface. A network administrator user could exploit this vulnerability by accessing an affected device through SSH management to make a configuration change. A successful exploit could allow the attacker to gain privileges equivalent to the root user.",Cisco,Cisco Wireless Lan Controller (wlc),7.8,HIGH,0.0004199999966658652,false,,false,false,true,2024-08-03T17:15:55.000Z,,false,false,,2021-09-23T03:15:00.000Z,0 CVE-2020-3492,https://securityvulnerability.io/vulnerability/CVE-2020-3492,Cisco IOS XE Software for Catalyst 9800 Series and Cisco AireOS Software for Cisco WLC Flexible NetFlow Version 9 Denial of Service Vulnerability,"A vulnerability in the Flexible NetFlow Version 9 packet processor of Cisco IOS XE Software for Cisco Catalyst 9800 Series Wireless Controllers and Cisco AireOS Software for Cisco Wireless LAN Controllers (WLC) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of certain parameters in a Flexible NetFlow Version 9 record. An attacker could exploit this vulnerability by spoofing the address of an existing Access Point on the network and sending a Control and Provisioning of Wireless Access Points (CAPWAP) packet that includes a crafted Flexible NetFlow Version 9 record to an affected device. A successful exploit could allow the attacker to cause a process crash that would lead to a reload of the device.",Cisco,Cisco Wireless Lan Controller (wlc),8.6,HIGH,0.0015999999595806003,false,,false,false,true,2024-08-04T08:16:43.000Z,,false,false,,2020-09-24T00:00:00.000Z,0 CVE-2020-3273,https://securityvulnerability.io/vulnerability/CVE-2020-3273,Cisco Wireless LAN Controller 802.11 Generic Advertisement Service Denial of Service Vulnerability,"A vulnerability in the 802.11 Generic Advertisement Service (GAS) frame processing function of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS). The vulnerability is due to incomplete input validation of the 802.11 GAS frames that are processed by an affected device. An attacker could exploit this vulnerability by sending a crafted 802.11 GAS frame over the air to an access point (AP), and that frame would then be relayed to the affected WLC. Also, an attacker with Layer 3 connectivity to the WLC could exploit this vulnerability by sending a malicious 802.11 GAS payload in a Control and Provisioning of Wireless Access Points (CAPWAP) packet to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS.",Cisco,Cisco Wireless Lan Controller (wlc),8.6,HIGH,0.0015899999998509884,false,,false,false,true,2024-08-04T08:16:33.000Z,,false,false,,2020-04-15T00:00:00.000Z,0 CVE-2019-15276,https://securityvulnerability.io/vulnerability/CVE-2019-15276,Cisco Wireless LAN Controller HTTP Parsing Engine Denial of Service Vulnerability,"A vulnerability in the web interface of Cisco Wireless LAN Controller Software could allow a low-privileged, authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists due to a failure of the HTTP parsing engine to handle specially crafted URLs. An attacker could exploit this vulnerability by authenticating with low privileges to an affected controller and submitting the crafted URL to the web interface of the affected device. Conversely, an unauthenticated attacker could exploit this vulnerability by persuading a user of the web interface to click the crafted URL. A successful exploit could allow the attacker to cause an unexpected restart of the device, resulting in a DoS condition.",Cisco,Cisco Wireless Lan Controller (wlc),7.7,HIGH,0.16975000500679016,false,,false,false,true,2024-08-05T02:15:29.000Z,,false,false,,2019-11-26T03:15:00.000Z,0 CVE-2019-15266,https://securityvulnerability.io/vulnerability/CVE-2019-15266,Cisco Wireless LAN Controller Path Traversal Vulnerability,"A vulnerability in the CLI of Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, local attacker to view system files that should be restricted. This vulnerability is due to improper sanitization of user-supplied input in command-line parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files that may contain sensitive information.",Cisco,Cisco Wireless Lan Controller (wlc),4.4,MEDIUM,0.0004400000034365803,false,,false,false,true,2024-08-05T02:15:28.000Z,,false,false,,2019-10-16T00:00:00.000Z,0 CVE-2019-15262,https://securityvulnerability.io/vulnerability/CVE-2019-15262,Cisco Wireless LAN Controller Secure Shell Denial of Service Vulnerability,"A vulnerability in the Secure Shell (SSH) session management for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists because the SSH process is not properly deleted when an SSH connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly opening SSH connections to an affected device. A successful exploit could allow the attacker to exhaust system resources by initiating multiple SSH connections to the device that are not effectively terminated, which could result in a DoS condition.",Cisco,Cisco Wireless Lan Controller (wlc),8.6,HIGH,0.0015899999998509884,false,,false,false,true,2024-08-05T02:15:28.000Z,,false,false,,2019-10-16T00:00:00.000Z,0 CVE-2019-1830,https://securityvulnerability.io/vulnerability/CVE-2019-1830,Cisco Wireless LAN Controller Locally Significant Certificate Denial of Service Vulnerability,"A vulnerability in Locally Significant Certificate (LSC) management for the Cisco Wireless LAN Controller (WLC) could allow an authenticated, remote attacker to cause the device to unexpectedly restart, which causes a denial of service (DoS) condition. The attacker would need to have valid administrator credentials. The vulnerability is due to incorrect input validation of the HTTP URL used to establish a connection to the LSC Certificate Authority (CA). An attacker could exploit this vulnerability by authenticating to the targeted device and configuring a LSC certificate. An exploit could allow the attacker to cause a DoS condition due to an unexpected restart of the device.",Cisco,Cisco Wireless Lan Controller (wlc),4.9,MEDIUM,0.0008699999889358878,false,,false,false,true,2024-08-04T19:16:12.000Z,,false,false,,2019-04-18T02:29:00.000Z,0 CVE-2019-1805,https://securityvulnerability.io/vulnerability/CVE-2019-1805,Cisco Wireless LAN Controller Secure Shell Unauthorized Access Vulnerability,"A vulnerability in certain access control mechanisms for the Secure Shell (SSH) server implementation for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to access a CLI instance on an affected device. The vulnerability is due to a lack of proper input- and validation-checking mechanisms for inbound SSH connections on an affected device. An attacker could exploit this vulnerability by attempting to establish an SSH connection to an affected controller. An exploit could allow the attacker to access an affected device's CLI to potentially cause further attacks. This vulnerability has been fixed in version 8.5(140.0).",Cisco,Cisco Wireless Lan Controller (wlc),5.4,MEDIUM,0.0005200000014156103,false,,false,false,true,2024-08-04T19:16:11.000Z,,false,false,,2019-04-18T01:29:00.000Z,0 CVE-2019-1796,https://securityvulnerability.io/vulnerability/CVE-2019-1796,Cisco Wireless LAN Controller Software IAPP Message Handling Denial of Service Vulnerabilities,"A vulnerability in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerability by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. Software versions prior to 8.2.170.0, 8.5.150.0, and 8.8.100.0 are affected.",Cisco,Cisco Wireless Lan Controller (wlc),7.4,HIGH,0.000539999979082495,false,,false,false,true,2024-08-04T19:16:11.000Z,,false,false,,2019-04-18T01:29:00.000Z,0 CVE-2019-1799,https://securityvulnerability.io/vulnerability/CVE-2019-1799,Cisco Wireless LAN Controller Software IAPP Message Handling Denial of Service Vulnerabilities,"A vulnerability in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerability by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. Software versions prior to 8.2.170.0, 8.5.150.0, and 8.8.100.0 are affected.",Cisco,Cisco Wireless Lan Controller (wlc),7.4,HIGH,0.000539999979082495,false,,false,false,true,2024-08-04T19:16:11.000Z,,false,false,,2019-04-18T01:29:00.000Z,0 CVE-2019-1797,https://securityvulnerability.io/vulnerability/CVE-2019-1797,Cisco Wireless LAN Controller Software Cross-Site Request Forgery Vulnerability,"A vulnerability in the web-based management interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack and perform arbitrary actions on the device with the privileges of the user, including modifying the device configuration. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading an interface user to follow a crafted link. A successful exploit could allow the attacker to perform arbitrary actions on the device with the privileges of the user. Software versions prior to 8.3.150.0, 8.5.135.0, and 8.8.100.0 are affected.",Cisco,Cisco Wireless Lan Controller (wlc),8.1,HIGH,0.0013699999544769526,false,,false,false,true,2024-08-04T19:16:11.000Z,,false,false,,2019-04-18T01:29:00.000Z,0 CVE-2019-1800,https://securityvulnerability.io/vulnerability/CVE-2019-1800,Cisco Wireless LAN Controller Software IAPP Message Handling Denial of Service Vulnerabilities,"A vulnerability in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerability by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. Software versions prior to 8.2.170.0, 8.5.150.0, and 8.8.100.0 are affected.",Cisco,Cisco Wireless Lan Controller (wlc),7.4,HIGH,0.000539999979082495,false,,false,false,true,2024-08-04T19:16:11.000Z,,false,false,,2019-04-18T01:29:00.000Z,0 CVE-2018-0382,https://securityvulnerability.io/vulnerability/CVE-2018-0382,Cisco Wireless LAN Controller Software Session Hijacking Vulnerability,"A vulnerability in the session identification management functionality of the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system. The vulnerability exists because the affected software does not properly clear previously assigned session identifiers for a user session when a user authenticates to the web-based interface. An attacker could exploit this vulnerability by using an existing session identifier to connect to the software through the web-based interface. Successful exploitation could allow the attacker to hijack an authenticated user's browser session on the system. Versions 8.1 and 8.5 are affected.",Cisco,Cisco Wireless Lan Controller (wlc),5.3,MEDIUM,0.0011099999537691474,false,,false,false,true,2024-08-05T04:15:19.000Z,,false,false,,2019-04-17T00:00:00.000Z,0 CVE-2018-0248,https://securityvulnerability.io/vulnerability/CVE-2018-0248,Cisco Wireless LAN Controller Software GUI Configuration Denial of Service Vulnerabilities,"A vulnerability in the administrative GUI configuration feature of Cisco Wireless LAN Controller (WLC) Software could allow an aUTHENTICated, remote attacker to cause the device to reload unexpectedly during device configuration when the administrator is using this GUI, causing a denial of service (DoS) condition on an affected device. The attacker would need to have valid administrator credentials on the device. This vulnerability is due to incomplete input validation for unexpected configuration options that the attacker could submit while accessing the GUI configuration menus. An attacker could exploit these vulnerabilities by authenticating to the device and submitting crafted user input when using the administrative GUI configuration feature. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Software versions prior to 8.3.150.0, 8.5.140.0, 8.8.111.0 are affected by this vulnerability.",Cisco,Cisco Wireless Lan Controller (wlc),6.8,MEDIUM,0.0007800000021234155,false,,false,false,true,2024-08-05T04:15:15.000Z,,false,false,,2019-04-17T00:00:00.000Z,0 CVE-2018-0388,https://securityvulnerability.io/vulnerability/CVE-2018-0388,Cisco Wireless LAN Controller Software Cross-Site Scripting Vulnerability,"A vulnerability in the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, remote attacker to conduct a cross-site scripting (XSS) attack against the user of the web-based interface of an affected system. The vulnerability is due to insufficient validation of user-supplied input by the web-based interface. An attacker could exploit this vulnerability by persuading a user to click a crafted link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or allow the attacker to access sensitive browser-based information.",Cisco,Cisco Wireless Lan Controller (wlc),4.8,MEDIUM,0.0006399999838322401,false,,false,false,true,2024-08-05T04:15:19.000Z,,false,false,,2018-10-17T00:00:00.000Z,0 CVE-2018-0443,https://securityvulnerability.io/vulnerability/CVE-2018-0443,Cisco Wireless LAN Controller Software Control and Provisioning of Wireless Access Points Protocol Denial of Service Vulnerability,"A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to improper input validation on fields within CAPWAP Discovery Request packets by the affected device. An attacker could exploit this vulnerability by sending malicious CAPWAP Discovery Request packets to the Cisco WLC Software. A successful exploit could allow the attacker to cause the Cisco WLC Software to disconnect associated access points (APs). While the APs disconnect and reconnect, service will be unavailable for a brief period of time, resulting in a DoS condition.",Cisco,Cisco Wireless Lan Controller (wlc),8.6,HIGH,0.0024999999441206455,false,,false,false,true,2024-08-05T04:15:21.000Z,,false,false,,2018-10-17T00:00:00.000Z,0 CVE-2018-15395,https://securityvulnerability.io/vulnerability/CVE-2018-15395,Cisco Wireless LAN Controller Software Privilege Escalation Vulnerability,"A vulnerability in the authentication and authorization checking mechanisms of Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, adjacent attacker to gain network access to a Cisco TrustSec domain. Under normal circumstances, this access should be prohibited. The vulnerability is due to the dynamic assignment of Security Group Tags (SGTs) during a wireless roam from one Service Set Identifier (SSID) to another within the Cisco TrustSec domain. An attacker could exploit this vulnerability by attempting to acquire an SGT from other SSIDs within the domain. Successful exploitation could allow the attacker to gain privileged network access that should be prohibited under normal circumstances.",Cisco,Cisco Wireless Lan Controller (wlc),5.4,MEDIUM,0.0004900000058114529,false,,false,false,true,2024-08-05T10:17:49.000Z,,false,false,,2018-10-17T00:00:00.000Z,0 CVE-2018-0420,https://securityvulnerability.io/vulnerability/CVE-2018-0420,Cisco Wireless LAN Controller Software Directory Traversal Vulnerability,"A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames and pathnames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files on the targeted device, which may contain sensitive information.",Cisco,Cisco Wireless Lan Controller (wlc),6.5,MEDIUM,0.001230000052601099,false,,false,false,true,2024-08-05T04:15:20.000Z,,false,false,,2018-10-17T00:00:00.000Z,0 CVE-2018-0442,https://securityvulnerability.io/vulnerability/CVE-2018-0442,Cisco Wireless LAN Controller Software Control and Provisioning of Wireless Access Points Protocol Information Disclosure Vulnerability,"A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to retrieve memory contents, which could lead to the disclosure of confidential information. The vulnerability is due to insufficient condition checks in the part of the code that handles CAPWAP keepalive requests. An attacker could exploit this vulnerability by sending a crafted CAPWAP keepalive packet to a vulnerable Cisco WLC device. A successful exploit could allow the attacker to retrieve the contents of device memory, which could lead to the disclosure of confidential information.",Cisco,Cisco Wireless Lan Controller (wlc),7.5,HIGH,0.0011699999449774623,false,,false,false,true,2024-08-05T04:15:21.000Z,,false,false,,2018-10-17T00:00:00.000Z,0 CVE-2018-0417,https://securityvulnerability.io/vulnerability/CVE-2018-0417,Cisco Wireless LAN Controller Software GUI Privilege Escalation Vulnerability,"A vulnerability in TACACS authentication with Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, local attacker to perform certain operations within the GUI that are not normally available to that user on the CLI. The vulnerability is due to incorrect parsing of a specific TACACS attribute received in the TACACS response from the remote TACACS server. An attacker could exploit this vulnerability by authenticating via TACACS to the GUI on the affected device. A successful exploit could allow an attacker to create local user accounts with administrative privileges on an affected WLC and execute other commands that are not allowed from the CLI and should be prohibited.",Cisco,Cisco Wireless Lan Controller (wlc),7.5,HIGH,0.00044999999227002263,false,,false,false,true,2024-08-05T04:15:20.000Z,,false,false,,2018-10-17T00:00:00.000Z,0 CVE-2018-0416,https://securityvulnerability.io/vulnerability/CVE-2018-0416,Cisco Wireless LAN Controller Software Information Disclosure Vulnerability,"A vulnerability in the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to view system information that under normal circumstances should be prohibited. The vulnerability is due to incomplete input and validation checking mechanisms in the web-based interface URL request. An attacker could exploit this vulnerability by requesting specific URLs via the web-based interface. A successful exploit could allow the attacker to view sensitive system information.",Cisco,Cisco Wireless Lan Controller (wlc),5.3,MEDIUM,0.0009899999713525176,false,,false,false,true,2024-08-05T04:15:20.000Z,,false,false,,2018-10-17T00:00:00.000Z,0 CVE-2018-0245,https://securityvulnerability.io/vulnerability/CVE-2018-0245,,"A vulnerability in the REST API of Cisco 5500 and 8500 Series Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to view system information that under normal circumstances should be prohibited. The vulnerability is due to incomplete input and validation checking mechanisms in the REST API URL request. An attacker could exploit this vulnerability by sending a malicious URL to the REST API. If successful, an exploit could allow the attacker to view sensitive system information. Cisco Bug IDs: CSCvg89442.",Cisco,Cisco 5500 And 8500 Series Wireless Lan Controller,5.3,MEDIUM,0.001129999989643693,false,,false,false,false,,,false,false,,2018-05-02T22:00:00.000Z,0