SB2020041604 - Multiple vulnerabilities in Cisco Wireless LAN Controller (WLC)
Published: April 16, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2020-3273)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when processing the 802.11 Generic Advertisement Service (GAS) frames. A remote attacker can send a specially crafted 802.11 GAS frame over the air to an access point (AP), trigger memory corruption and cause a denial of service condition on the target system.
2) Input validation error (CVE-ID: CVE-2020-3262)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol handler. A remote attacker can send a malformed CAPWAP packet to the application and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.