ID

VAR-201502-0150


CVE

CVE-2015-0622


TITLE

Cisco Wireless LAN Controller Run on device Wireless Intrusion Detection Service disruption in functionality (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2015-001553

DESCRIPTION

The Wireless Intrusion Detection (aka WIDS) functionality on Cisco Wireless LAN Controller (WLC) devices allows remote attackers to cause a denial of service (device outage) via crafted packets that are improperly handled during rendering of the Signature Events Summary page, aka Bug ID CSCus46861. Attackers can exploit this issue to restart the affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCus46861

Trust: 2.52

sources: NVD: CVE-2015-0622 // JVNDB: JVNDB-2015-001553 // CNVD: CNVD-2015-01213 // BID: 72665 // VULHUB: VHN-78568

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-01213

AFFECTED PRODUCTS

vendor:ciscomodel:wireless lan controllerscope: - version: -

Trust: 2.0

vendor:ciscomodel:wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:wireless lan controller softwarescope:lteversion:8.0(100)

Trust: 0.8

sources: CNVD: CNVD-2015-01213 // JVNDB: JVNDB-2015-001553 // CNNVD: CNNVD-201502-419 // NVD: CVE-2015-0622

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0622
value: HIGH

Trust: 1.0

NVD: CVE-2015-0622
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-01213
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201502-419
value: HIGH

Trust: 0.6

VULHUB: VHN-78568
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0622
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-01213
severity: MEDIUM
baseScore: 5.7
vectorString: AV:A/AC:M/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 5.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78568
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-01213 // VULHUB: VHN-78568 // JVNDB: JVNDB-2015-001553 // CNNVD: CNNVD-201502-419 // NVD: CVE-2015-0622

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-78568 // JVNDB: JVNDB-2015-001553 // NVD: CVE-2015-0622

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201502-419

TYPE

input validation

Trust: 0.6

sources: CNNVD: CNNVD-201502-419

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001553

PATCH

title:Cisco Wireless LAN Controller Denial of Service Vulnerabilityurl:http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0622

Trust: 0.8

title:37516url:http://tools.cisco.com/security/center/viewAlert.x?alertId=37516

Trust: 0.8

title:Patch for Cisco Wireless LAN Controller Denial of Service Vulnerability (CNVD-2015-01213)url:https://www.cnvd.org.cn/patchInfo/show/55490

Trust: 0.6

sources: CNVD: CNVD-2015-01213 // JVNDB: JVNDB-2015-001553

EXTERNAL IDS

db:NVDid:CVE-2015-0622

Trust: 3.4

db:BIDid:72665

Trust: 1.0

db:JVNDBid:JVNDB-2015-001553

Trust: 0.8

db:CNNVDid:CNNVD-201502-419

Trust: 0.7

db:CNVDid:CNVD-2015-01213

Trust: 0.6

db:VULHUBid:VHN-78568

Trust: 0.1

sources: CNVD: CNVD-2015-01213 // VULHUB: VHN-78568 // BID: 72665 // JVNDB: JVNDB-2015-001553 // CNNVD: CNNVD-201502-419 // NVD: CVE-2015-0622

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecuritynotice/cve-2015-0622

Trust: 2.3

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0622

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0622

Trust: 0.8

url:http://www.securityfocus.com/bid/72665/

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2015-01213 // VULHUB: VHN-78568 // BID: 72665 // JVNDB: JVNDB-2015-001553 // CNNVD: CNNVD-201502-419 // NVD: CVE-2015-0622

CREDITS

Darren Johnson

Trust: 0.3

sources: BID: 72665

SOURCES

db:CNVDid:CNVD-2015-01213
db:VULHUBid:VHN-78568
db:BIDid:72665
db:JVNDBid:JVNDB-2015-001553
db:CNNVDid:CNNVD-201502-419
db:NVDid:CVE-2015-0622

LAST UPDATE DATE

2024-11-23T22:38:53.474000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2015-01213date:2015-05-21T00:00:00
db:VULHUBid:VHN-78568date:2015-02-19T00:00:00
db:BIDid:72665date:2015-03-08T16:01:00
db:JVNDBid:JVNDB-2015-001553date:2015-02-23T00:00:00
db:CNNVDid:CNNVD-201502-419date:2015-02-26T00:00:00
db:NVDid:CVE-2015-0622date:2024-11-21T02:23:25.673

SOURCES RELEASE DATE

db:CNVDid:CNVD-2015-01213date:2015-02-27T00:00:00
db:VULHUBid:VHN-78568date:2015-02-19T00:00:00
db:BIDid:72665date:2015-02-18T00:00:00
db:JVNDBid:JVNDB-2015-001553date:2015-02-23T00:00:00
db:CNNVDid:CNNVD-201502-419date:2015-02-26T00:00:00
db:NVDid:CVE-2015-0622date:2015-02-19T00:59:00.070