Vigil@nce - Cisco Wireless LAN Controller: denial of service via RADIUS
November 2015 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can forge a disconnect RADIUS packet to Cisco Wireless
LAN Controller, in order to trigger a denial of service.
Impacted products: Cisco Wireless Controller.
Severity: 2/4.
Creation date: 22/09/2015.
DESCRIPTION OF THE VULNERABILITY
The Cisco Wireless LAN Controller can connect to a RADIUS server.
However, a lack of proper input validation of the RADIUS
Disconnect-Request packet generates a client disconnection.
An attacker can therefore forge a disconnect RADIUS packet to
Cisco Wireless LAN Controller, in order to trigger a denial of
service.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/Cisco-Wireless-LAN-Controller-denial-of-service-via-RADIUS-17947