ID

VAR-201904-0422


CVE

CVE-2019-1796


TITLE

Cisco Wireless LAN Controller Software resource management vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-003530

DESCRIPTION

A vulnerability in the handling of Inter-Access Point Protocol (IAPP) messages by Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability exist because the software improperly validates input on fields within IAPP messages. An attacker could exploit the vulnerability by sending malicious IAPP messages to an affected device. A successful exploit could allow the attacker to cause the Cisco WLC Software to reload, resulting in a DoS condition. Software versions prior to 8.2.170.0, 8.5.150.0, and 8.8.100.0 are affected. Cisco Wireless LAN Controller is prone to multiple denial-of-service vulnerabilities. These issues are being tracked by Cisco Bug IDs CSCvh91032, CSCvh96364, and CSCvi89027. There is a resource management error vulnerability in the processing of IAPP messages in Cisco WLC Software, which originates from the improper management of system resources (such as memory, disk space, files, etc.) by network systems or products

Trust: 1.98

sources: NVD: CVE-2019-1796 // JVNDB: JVNDB-2019-003530 // BID: 108008 // VULHUB: VHN-150258

AFFECTED PRODUCTS

vendor:ciscomodel:wireless lan controller softwarescope:ltversion:8.5.150.0

Trust: 1.8

vendor:ciscomodel:wireless lan controller softwarescope:ltversion:8.8.100.0

Trust: 1.8

vendor:ciscomodel:wireless lan controller softwarescope:gteversion:8.7.106.0

Trust: 1.0

vendor:ciscomodel:wireless lan controllerscope:ltversion:8.2.170.0

Trust: 1.0

vendor:ciscomodel:wireless lan controller softwarescope:gteversion:8.3.143.0

Trust: 1.0

vendor:ciscomodel:wireless lan controller softwarescope:ltversion:8.2.170.0

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.5.110

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.3.143

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.3.140

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.8

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.7.106.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.7.102.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.7

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.5.105.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.4

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.3.111.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.3.102.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.3

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.2.141.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.2.130.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.2

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.1

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.0.140.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:8.0

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:eqversion:8.0.100

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:eqversion:8.0.140

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:eqversion:8.2.164.0

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:eqversion:8.2.121.0

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:eqversion:8.1.131.0

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:eqversion:8.1.104.37

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:eqversion:8.0.140.0

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:eqversion:8.0.132.0

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:eqversion:8.0.120.0

Trust: 0.3

vendor:ciscomodel:wireless lan controllerscope:eqversion:8.0.100.0

Trust: 0.3

vendor:ciscomodel:series wireless controllerscope:eqversion:55000

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:neversion:8.8.120.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:neversion:8.8.100.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:neversion:8.5.140.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:neversion:8.5.131.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:neversion:8.3.150.0

Trust: 0.3

vendor:ciscomodel:wireless lan controller softwarescope:neversion:8.2.170.0

Trust: 0.3

sources: BID: 108008 // JVNDB: JVNDB-2019-003530 // NVD: CVE-2019-1796

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1796
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1796
value: HIGH

Trust: 1.0

NVD: CVE-2019-1796
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201904-864
value: MEDIUM

Trust: 0.6

VULHUB: VHN-150258
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-1796
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-150258
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-1796
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1796
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 4.0
version: 3.0

Trust: 1.0

NVD: CVE-2019-1796
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-150258 // JVNDB: JVNDB-2019-003530 // CNNVD: CNNVD-201904-864 // NVD: CVE-2019-1796 // NVD: CVE-2019-1796

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

problemtype:CWE-20

Trust: 1.1

sources: VULHUB: VHN-150258 // JVNDB: JVNDB-2019-003530 // NVD: CVE-2019-1796

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201904-864

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201904-864

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-003530

PATCH

title:cisco-sa-20190417-wlc-iappurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlc-iapp

Trust: 0.8

title:Cisco Wireless LAN Controller Software Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=91698

Trust: 0.6

sources: JVNDB: JVNDB-2019-003530 // CNNVD: CNNVD-201904-864

EXTERNAL IDS

db:NVDid:CVE-2019-1796

Trust: 2.8

db:BIDid:108008

Trust: 2.0

db:JVNDBid:JVNDB-2019-003530

Trust: 0.8

db:CNNVDid:CNNVD-201904-864

Trust: 0.7

db:AUSCERTid:ESB-2019.1333

Trust: 0.6

db:VULHUBid:VHN-150258

Trust: 0.1

sources: VULHUB: VHN-150258 // BID: 108008 // JVNDB: JVNDB-2019-003530 // CNNVD: CNNVD-201904-864 // NVD: CVE-2019-1796

REFERENCES

url:http://www.securityfocus.com/bid/108008

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190417-wlc-iapp

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-1796

Trust: 1.4

url:http://www.cisco.com/en/us/products/ps6302/products_sub_category_home.html

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1796

Trust: 0.8

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190417-wlc-cert-dos

Trust: 0.6

url:https://www.auscert.org.au/bulletins/79298

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-wireless-lan-controller-denial-of-service-via-iapp-message-29092

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-150258 // BID: 108008 // JVNDB: JVNDB-2019-003530 // CNNVD: CNNVD-201904-864 // NVD: CVE-2019-1796

CREDITS

Cisco

Trust: 0.9

sources: BID: 108008 // CNNVD: CNNVD-201904-864

SOURCES

db:VULHUBid:VHN-150258
db:BIDid:108008
db:JVNDBid:JVNDB-2019-003530
db:CNNVDid:CNNVD-201904-864
db:NVDid:CVE-2019-1796

LAST UPDATE DATE

2024-11-23T22:17:05.376000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-150258date:2020-10-13T00:00:00
db:BIDid:108008date:2019-04-17T00:00:00
db:JVNDBid:JVNDB-2019-003530date:2019-05-20T00:00:00
db:CNNVDid:CNNVD-201904-864date:2020-10-28T00:00:00
db:NVDid:CVE-2019-1796date:2024-11-21T04:37:24

SOURCES RELEASE DATE

db:VULHUBid:VHN-150258date:2019-04-18T00:00:00
db:BIDid:108008date:2019-04-17T00:00:00
db:JVNDBid:JVNDB-2019-003530date:2019-05-20T00:00:00
db:CNNVDid:CNNVD-201904-864date:2019-04-17T00:00:00
db:NVDid:CVE-2019-1796date:2019-04-18T01:29:02.470