ID

VAR-201301-0343


CVE

CVE-2013-1102


TITLE

Cisco Wireless LAN Controller Service disruption in ( Device reload ) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2013-001271

DESCRIPTION

The Wireless Intrusion Prevention System (wIPS) component on Cisco Wireless LAN Controller (WLC) devices with software 7.0 before 7.0.235.0, 7.1 and 7.2 before 7.2.110.0, and 7.3 before 7.3.101.0 allows remote attackers to cause a denial of service (device reload) via crafted IP packets, aka Bug ID CSCtx80743. Service attack. Exploiting these issues could allow an attacker to deny service to legitimate users, execute arbitrary code, or gain unauthorized access. Other attacks may also be possible. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Cisco Wireless LAN Controllers Multiple Vulnerabilities SECUNIA ADVISORY ID: SA51965 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51965/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51965 RELEASE DATE: 2013-01-24 DISCUSS ADVISORY: http://secunia.com/advisories/51965/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51965/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51965 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Cisco Wireless Lan Controllers, which can be exploited by malicious users to bypass certain security restrictions and compromise a vulnerable system and by malicious people to cause a DoS (Denial of Service). 1) An error within the wIPS component when handling certain IP packets can be exploited to cause a reload. 2) An error when handling certain Session Initiation Protocol (SIP) packets can be exploited to cause a reload. 3) An input sanitisation error can be exploited to execute arbitrary code by sending a specially crafted UserAgent string. 4) An error when handling access restrictions can be exploited to view or modify sensitive information such as configuration files. The vulnerabilities are reported in the following products: * Cisco 2000 Series WLC * Cisco 2100 Series WLC * Cisco 2500 Series WLC * Cisco 4100 Series WLC * Cisco 4400 Series WLC * Cisco 5500 Series WLC * Cisco 7500 Series WLC * Cisco 8500 Series WLC * Cisco 500 Series Wireless Express Mobility Controllers * Cisco Wireless Services Module (Cisco WiSM) * Cisco Wireless Services Module version 2 (Cisco WiSM version 2) * Cisco NME-AIR-WLC Module for Integrated Services Routers (ISRs) * Cisco NM-AIR-WLC Module for Integrated Services Routers (ISRs) * Cisco Catalyst 3750G Integrated WLCs * Cisco Flex 7500 Series Cloud Controller * Cisco Virtual Wireless Controller * Cisco Wireless Controller Software for Integrated Services Module 300 and Cisco Services-Ready Engine 700, 710, 900, and 910 SOLUTION: Apply update (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: #1, #2, #3) Reported by the vendor. #4) The vendor credits Darren Johnson. ORIGINAL ADVISORY: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.61

sources: NVD: CVE-2013-1102 // JVNDB: JVNDB-2013-001271 // CNVD: CNVD-2013-00522 // BID: 57524 // VULHUB: VHN-61104 // PACKETSTORM: 119786

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2013-00522

AFFECTED PRODUCTS

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.1

Trust: 2.4

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.0.98.0

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.0

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.2

Trust: 1.6

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.3

Trust: 1.6

vendor:ciscomodel:2500 wireless lan controllerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:2000 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:4400 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:5500 wireless lan controllerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:2100 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:4100 wireless lan controllerscope:eqversion:*

Trust: 1.0

vendor:ciscomodel:7500 wireless lan controllerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:8500 wireless lan controllerscope:eqversion: -

Trust: 1.0

vendor:ciscomodel:wireless lan controlscope:eqversion:7.3

Trust: 0.9

vendor:ciscomodel:wireless lan controlscope:eqversion:7.0

Trust: 0.9

vendor:ciscomodel:wireless lan controlscope:eqversion:7.1

Trust: 0.9

vendor:ciscomodel:wireless lan controlscope:eqversion:7.2

Trust: 0.9

vendor:ciscomodel:2100 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:2500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.3.101.0

Trust: 0.8

vendor:ciscomodel:4400 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:7500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.0.235.0

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:eqversion:7.2.110.0

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:ltversion:7.3

Trust: 0.8

vendor:ciscomodel:5500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:ltversion:7.0

Trust: 0.8

vendor:ciscomodel:wireless lan controller softwarescope:ltversion:7.2

Trust: 0.8

vendor:ciscomodel:8500 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:4100 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:2000 series wireless lan controllerscope: - version: -

Trust: 0.8

vendor:ciscomodel:wireless lan controlscope:neversion:7.3.110.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.3.101.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.2.111.3

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.2.110.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.2.103.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.1.91.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.0.240.0

Trust: 0.3

vendor:ciscomodel:wireless lan controlscope:neversion:7.0.220.0

Trust: 0.3

sources: CNVD: CNVD-2013-00522 // BID: 57524 // JVNDB: JVNDB-2013-001271 // CNNVD: CNNVD-201301-498 // NVD: CVE-2013-1102

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-1102
value: HIGH

Trust: 1.0

NVD: CVE-2013-1102
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201301-498
value: HIGH

Trust: 0.6

VULHUB: VHN-61104
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-1102
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-61104
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-61104 // JVNDB: JVNDB-2013-001271 // CNNVD: CNNVD-201301-498 // NVD: CVE-2013-1102

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2013-1102

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201301-498

TYPE

Unknown

Trust: 0.3

sources: BID: 57524

CONFIGURATIONS

sources: JVNDB: JVNDB-2013-001271

PATCH

title:cisco-sa-20130123-wlcurl:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc

Trust: 0.8

title:cisco-sa-20130123-wlcurl:http://www.cisco.com/cisco/web/support/JP/111/1117/1117081_cisco-sa-20130123-wlc-j.html

Trust: 0.8

title:Patch for Cisco Wireless LAN Controller Denial of Service Vulnerability (CNVD-2013-00522)url:https://www.cnvd.org.cn/patchInfo/show/31452

Trust: 0.6

sources: CNVD: CNVD-2013-00522 // JVNDB: JVNDB-2013-001271

EXTERNAL IDS

db:NVDid:CVE-2013-1102

Trust: 3.4

db:BIDid:57524

Trust: 2.0

db:SECUNIAid:51965

Trust: 1.2

db:SECTRACKid:1028027

Trust: 1.1

db:JVNDBid:JVNDB-2013-001271

Trust: 0.8

db:CNNVDid:CNNVD-201301-498

Trust: 0.7

db:CNVDid:CNVD-2013-00522

Trust: 0.6

db:CISCOid:20130123 MULTIPLE VULNERABILITIES IN CISCO WIRELESS LAN CONTROLLERS

Trust: 0.6

db:VULHUBid:VHN-61104

Trust: 0.1

db:PACKETSTORMid:119786

Trust: 0.1

sources: CNVD: CNVD-2013-00522 // VULHUB: VHN-61104 // BID: 57524 // JVNDB: JVNDB-2013-001271 // PACKETSTORM: 119786 // CNNVD: CNNVD-201301-498 // NVD: CVE-2013-1102

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20130123-wlc

Trust: 2.1

url:http://www.securityfocus.com/bid/57524

Trust: 1.7

url:http://www.securitytracker.com/id/1028027

Trust: 1.1

url:http://secunia.com/advisories/51965

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-1102

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-1102

Trust: 0.8

url:http://tools.cisco.com/security/center/viewalert.x?alertid=27901

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51965

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/advisories/51965/#comments

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/blog/325/

Trust: 0.1

url:http://secunia.com/advisories/51965/

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

sources: CNVD: CNVD-2013-00522 // VULHUB: VHN-61104 // BID: 57524 // JVNDB: JVNDB-2013-001271 // PACKETSTORM: 119786 // CNNVD: CNNVD-201301-498 // NVD: CVE-2013-1102

CREDITS

Cisco and Darren Johnson

Trust: 0.9

sources: BID: 57524 // CNNVD: CNNVD-201301-498

SOURCES

db:CNVDid:CNVD-2013-00522
db:VULHUBid:VHN-61104
db:BIDid:57524
db:JVNDBid:JVNDB-2013-001271
db:PACKETSTORMid:119786
db:CNNVDid:CNNVD-201301-498
db:NVDid:CVE-2013-1102

LAST UPDATE DATE

2025-04-11T22:53:27.645000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2013-00522date:2013-01-25T00:00:00
db:VULHUBid:VHN-61104date:2013-02-02T00:00:00
db:BIDid:57524date:2013-01-23T00:00:00
db:JVNDBid:JVNDB-2013-001271date:2013-01-28T00:00:00
db:CNNVDid:CNNVD-201301-498date:2013-01-25T00:00:00
db:NVDid:CVE-2013-1102date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2013-00522date:2013-01-25T00:00:00
db:VULHUBid:VHN-61104date:2013-01-24T00:00:00
db:BIDid:57524date:2013-01-23T00:00:00
db:JVNDBid:JVNDB-2013-001271date:2013-01-28T00:00:00
db:PACKETSTORMid:119786date:2013-01-24T06:41:56
db:CNNVDid:CNNVD-201301-498date:2013-01-25T00:00:00
db:NVDid:CVE-2013-1102date:2013-01-24T21:55:05.900