ID

VAR-201604-0559


CVE

CVE-2016-1362


TITLE

Cisco Wireless LAN Controller Runs on the device AireOS Service disruption in (DoS) Vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2016-002358

DESCRIPTION

Cisco AireOS 4.1 through 7.4.120.0, 7.5.x, and 7.6.100.0 on Wireless LAN Controller (WLC) devices allows remote attackers to cause a denial of service (device reload) via a crafted HTTP request, aka Bug ID CSCun86747. The Cisco WLC is responsible for system-wide wireless LAN functions such as security policy, intrusion protection, RF management, quality of service, and mobility. Attackers can exploit this issue to crash and reload the affected device, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCun86747. Cisco WLC Up Cisco AireOS There are security holes in . The following versions are affected: Cisco AireOS 4.1 version to 7.4.120.0 Version, 7.5.x Version, 7.6.100.0 Version

Trust: 2.52

sources: NVD: CVE-2016-1362 // JVNDB: JVNDB-2016-002358 // CNVD: CNVD-2016-02519 // BID: 86772 // VULHUB: VHN-90181

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-02519

AFFECTED PRODUCTS

vendor:ciscomodel:aireosscope:eqversion:7.6

Trust: 1.6

vendor:ciscomodel:aireosscope:eqversion:7.5_base

Trust: 1.6

vendor:ciscomodel:aireosscope:eqversion:4.1_base

Trust: 1.6

vendor:ciscomodel:aireosscope:eqversion:7.4

Trust: 1.6

vendor:ciscomodel:aireosscope:eqversion:4.1 to 7.4.120.0

Trust: 0.8

vendor:ciscomodel:aireosscope:eqversion:7.5.x

Trust: 0.8

vendor:ciscomodel:aireosscope:eqversion:7.6.100.0

Trust: 0.8

vendor:ciscomodel:wireless lan controllerscope:eqversion:7.5.x

Trust: 0.6

vendor:ciscomodel:wireless lan controllerscope:gteversion:4.1<=7.4.120.0

Trust: 0.6

vendor:ciscomodel:wireless lan controllerscope:eqversion:7.6.100.0

Trust: 0.6

sources: CNVD: CNVD-2016-02519 // JVNDB: JVNDB-2016-002358 // CNNVD: CNNVD-201604-511 // NVD: CVE-2016-1362

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-1362
value: HIGH

Trust: 1.0

NVD: CVE-2016-1362
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-02519
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201604-511
value: HIGH

Trust: 0.6

VULHUB: VHN-90181
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-1362
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2016-02519
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-90181
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-1362
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-02519 // VULHUB: VHN-90181 // JVNDB: JVNDB-2016-002358 // CNNVD: CNNVD-201604-511 // NVD: CVE-2016-1362

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

sources: VULHUB: VHN-90181 // JVNDB: JVNDB-2016-002358 // NVD: CVE-2016-1362

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201604-511

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201604-511

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-002358

PATCH

title:cisco-sa-20160420-wlcurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-wlc

Trust: 0.8

title:Cisco WirelessLANControllerWeb Management Interface Denial of Service Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/74544

Trust: 0.6

title:Cisco Wireless LAN Controller AireOS Remediation measures for denial of service vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61200

Trust: 0.6

sources: CNVD: CNVD-2016-02519 // JVNDB: JVNDB-2016-002358 // CNNVD: CNNVD-201604-511

EXTERNAL IDS

db:NVDid:CVE-2016-1362

Trust: 3.4

db:SECTRACKid:1035634

Trust: 1.1

db:JVNDBid:JVNDB-2016-002358

Trust: 0.8

db:CNNVDid:CNNVD-201604-511

Trust: 0.7

db:CNVDid:CNVD-2016-02519

Trust: 0.6

db:BIDid:86772

Trust: 0.4

db:VULHUBid:VHN-90181

Trust: 0.1

sources: CNVD: CNVD-2016-02519 // VULHUB: VHN-90181 // BID: 86772 // JVNDB: JVNDB-2016-002358 // CNNVD: CNNVD-201604-511 // NVD: CVE-2016-1362

REFERENCES

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160420-wlc

Trust: 2.3

url:http://www.securitytracker.com/id/1035634

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1362

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1362

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2016-02519 // VULHUB: VHN-90181 // BID: 86772 // JVNDB: JVNDB-2016-002358 // CNNVD: CNNVD-201604-511 // NVD: CVE-2016-1362

CREDITS

Cisco

Trust: 0.3

sources: BID: 86772

SOURCES

db:CNVDid:CNVD-2016-02519
db:VULHUBid:VHN-90181
db:BIDid:86772
db:JVNDBid:JVNDB-2016-002358
db:CNNVDid:CNNVD-201604-511
db:NVDid:CVE-2016-1362

LAST UPDATE DATE

2025-04-13T23:18:00.424000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-02519date:2016-04-26T00:00:00
db:VULHUBid:VHN-90181date:2016-12-03T00:00:00
db:BIDid:86772date:2016-04-20T00:00:00
db:JVNDBid:JVNDB-2016-002358date:2016-05-02T00:00:00
db:CNNVDid:CNNVD-201604-511date:2016-04-22T00:00:00
db:NVDid:CVE-2016-1362date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-02519date:2016-04-26T00:00:00
db:VULHUBid:VHN-90181date:2016-04-21T00:00:00
db:BIDid:86772date:2016-04-20T00:00:00
db:JVNDBid:JVNDB-2016-002358date:2016-05-02T00:00:00
db:CNNVDid:CNNVD-201604-511date:2016-04-22T00:00:00
db:NVDid:CVE-2016-1362date:2016-04-21T11:00:00.493