SB2020041604 - Multiple vulnerabilities in Cisco Wireless LAN Controller (WLC)



SB2020041604 - Multiple vulnerabilities in Cisco Wireless LAN Controller (WLC)

Published: April 16, 2020

Security Bulletin ID SB2020041604
Severity
High
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

High 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2020-3273)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error when processing the 802.11 Generic Advertisement Service (GAS) frames. A remote attacker can send a specially crafted 802.11 GAS frame over the air to an access point (AP), trigger memory corruption and cause a denial of service condition on the target system.



2) Input validation error (CVE-ID: CVE-2020-3262)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol handler. A remote attacker can send a malformed CAPWAP packet to the application and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.