ID

VAR-201301-0346


CVE

CVE-2013-1105


TITLE

Cisco Wireless LAN Controller Vulnerability in which wireless management settings can be bypassed

Trust: 0.8

sources: JVNDB: JVNDB-2013-001274

DESCRIPTION

Cisco Wireless LAN Controller (WLC) devices with software 7.0 before 7.0.235.3, 7.1 and 7.2 before 7.2.111.3, and 7.3 before 7.3.101.0 allow remote authenticated users to bypass wireless-management settings and read or modify the device configuration via an SNMP request, aka Bug ID CSCua60653. The Cisco Wireless LAN Controller is responsible for system-wide wireless LAN functions such as security policy, intrusion protection, RF management, quality of service, and mobility. Exploiting these issues could allow an attacker to deny service to legitimate users, execute arbitrary code, or gain unauthorized access. Other attacks may also be possible. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Cisco Wireless LAN Controllers Multiple Vulnerabilities SECUNIA ADVISORY ID: SA51965 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51965/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51965 RELEASE DATE: 2013-01-24 DISCUSS ADVISORY: http://secunia.com/advisories/51965/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51965/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51965 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Cisco Wireless Lan Controllers, which can be exploited by malicious users to bypass certain security restrictions and compromise a vulnerable system and by malicious people to cause a DoS (Denial of Service). 1) An error within the wIPS component when handling certain IP packets can be exploited to cause a reload. Successful exploitation requires that Cisco WLCs are configured with Wireless Intrusion Prevention System (wIPS). 2) An error when handling certain Session Initiation Protocol (SIP) packets can be exploited to cause a reload. 3) An input sanitisation error can be exploited to execute arbitrary code by sending a specially crafted UserAgent string. 4) An error when handling access restrictions can be exploited to view or modify sensitive information such as configuration files. The vulnerabilities are reported in the following products: * Cisco 2000 Series WLC * Cisco 2100 Series WLC * Cisco 2500 Series WLC * Cisco 4100 Series WLC * Cisco 4400 Series WLC * Cisco 5500 Series WLC * Cisco 7500 Series WLC * Cisco 8500 Series WLC * Cisco 500 Series Wireless Express Mobility Controllers * Cisco Wireless Services Module (Cisco WiSM) * Cisco Wireless Services Module version 2 (Cisco WiSM version 2) * Cisco NME-AIR-WLC Module for Integrated Services Routers (ISRs) * Cisco NM-AIR-WLC Module for Integrated Services Routers (ISRs) * Cisco Catalyst 3750G Integrated WLCs * Cisco Flex 7500 Series Cloud Controller * Cisco Virtual Wireless Controller * Cisco Wireless Controller Software for Integrated Services Module 300 and Cisco Services-Ready Engine 700, 710, 900, and 910 SOLUTION: Apply update (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: #1, #2, #3) Reported by the vendor. #4) The vendor credits Darren Johnson. ORIGINAL ADVISORY: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2013-1105 // JVNDB: JVNDB-2013-001274 // CNVD: CNVD-2013-00530 // BID: 57524 // VULHUB: VHN-61107 // PACKETSTORM: 119786

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-00530

AFFECTED PRODUCTS

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.1

Trust: 2.4

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.0.220.0

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.0.98.0

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.0

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.2

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.3

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.2.110.0

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.2.103.0

Trust: 1.6

vendor:ciscomodel:2000 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:8500 wireless lan controllerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:2100 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:5500 wireless lan controllerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:7500 wireless lan controllerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:2500 wireless lan controllerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:2100 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:2500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.3.101.0

Trust: 0.8

vendor:ciscomodel:4400 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:7500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.2.111.3

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:ltversion:7.3

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.0.235.3

Trust: 0.8

vendor:ciscomodel:5500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:ltversion:7.0

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:ltversion:7.2

Trust: 0.8

vendor:ciscomodel:8500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:4100 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:2000 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controlscope:lteversion:<=7.2.103.0

Trust: 0.6

vendor:ciscomodel:wireless lan controlscope:lteversion:<=7.1.91.0

Trust: 0.6

vendor:ciscomodel:wireless lan controlscope:lteversion:<=7.0.220.0

Trust: 0.6

vendor:ciscomodel:wireless lan controlscope:eqversion:7.3

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:7.2

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.3.110.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.3.101.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.2.111.3

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.2.110.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.2.103.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.1.91.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.0.240.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.0.220.0

Trust: 0.3

sources: CNVD: CNVD-2013-00530 // BID: 57524 // JVNDB: JVNDB-2013-001274 // CNNVD: CNNVD-201301-501 // NVD: CVE-2013-1105

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1105
value: HIGH

Trust: 1.0

NVD: CVE-2013-1105
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201301-501
value: CRITICAL

Trust: 0.6

VULHUB: VHN-61107
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-1105
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-61107
severity: HIGH
baseScore: 9.0
vectorString: AV:N/AC:L/AU:S/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61107 // JVNDB: JVNDB-2013-001274 // CNNVD: CNNVD-201301-501 // NVD: CVE-2013-1105

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-61107 // JVNDB: JVNDB-2013-001274 // NVD: CVE-2013-1105

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201301-501

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201301-501

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001274

PATCH

title:cisco-sa-20130123-wlcurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc

Trust: 0.8

title:cisco-sa-20130123-wlcurl:http://www.cisco.com/cisco/web/support/JP/111/1117/1117081_cisco-sa-20130123-wlc-j.html

Trust: 0.8

title:Cisco Wireless LAN Controller SNMP Unverified Access Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/31491

Trust: 0.6

sources: CNVD: CNVD-2013-00530 // JVNDB: JVNDB-2013-001274

EXTERNAL IDS

db:NVDid:CVE-2013-1105

Trust: 3.4

db:BIDid:57524

Trust: 2.0

db:SECUNIAid:51965

Trust: 1.2

db:SECTRACKid:1028027

Trust: 1.1

db:OSVDBid:89532

Trust: 1.1

db:JVNDBid:JVNDB-2013-001274

Trust: 0.8

db:CNNVDid:CNNVD-201301-501

Trust: 0.7

db:CNVDid:CNVD-2013-00530

Trust: 0.6

db:CISCOid:20130123 MULTIPLE VULNERABILITIES IN CISCO WIRELESS LAN CONTROLLERS

Trust: 0.6

db:VULHUBid:VHN-61107

Trust: 0.1

db:PACKETSTORMid:119786

Trust: 0.1

sources: CNVD: CNVD-2013-00530 // VULHUB: VHN-61107 // BID: 57524 // JVNDB: JVNDB-2013-001274 // PACKETSTORM: 119786 // CNNVD: CNNVD-201301-501 // NVD: CVE-2013-1105

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130123-wlc

Trust: 2.1

url:http://www.securityfocus.com/bid/57524

Trust: 1.7

url:http://osvdb.org/89532

Trust: 1.1

url:http://www.securitytracker.com/id/1028027

Trust: 1.1

url:http://secunia.com/advisories/51965

Trust: 1.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/81490

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1105

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1105

Trust: 0.8

url:http://tools.cisco.com/security/center/viewalert.x?alertid=27904

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51965

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/51965/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/51965/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2013-00530 // VULHUB: VHN-61107 // BID: 57524 // JVNDB: JVNDB-2013-001274 // PACKETSTORM: 119786 // CNNVD: CNNVD-201301-501 // NVD: CVE-2013-1105

CREDITS

Cisco and Darren Johnson

Trust: 0.9

sources: BID: 57524 // CNNVD: CNNVD-201301-501

SOURCES

db:CNVDid:CNVD-2013-00530
db:VULHUBid:VHN-61107
db:BIDid:57524
db:JVNDBid:JVNDB-2013-001274
db:PACKETSTORMid:119786
db:CNNVDid:CNNVD-201301-501
db:NVDid:CVE-2013-1105

LAST UPDATE DATE

2024-11-23T21:45:49.945000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-00530date:2013-01-25T00:00:00
db:VULHUBid:VHN-61107date:2017-08-29T00:00:00
db:BIDid:57524date:2013-01-23T00:00:00
db:JVNDBid:JVNDB-2013-001274date:2013-01-28T00:00:00
db:CNNVDid:CNNVD-201301-501date:2013-01-25T00:00:00
db:NVDid:CVE-2013-1105date:2024-11-21T01:48:55.073

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-00530date:2013-01-25T00:00:00
db:VULHUBid:VHN-61107date:2013-01-24T00:00:00
db:BIDid:57524date:2013-01-23T00:00:00
db:JVNDBid:JVNDB-2013-001274date:2013-01-28T00:00:00
db:PACKETSTORMid:119786date:2013-01-24T06:41:56
db:CNNVDid:CNNVD-201301-501date:2013-01-25T00:00:00
db:NVDid:CVE-2013-1105date:2013-01-24T21:55:06.023