Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
cisco 5500 wireless lan controller - vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2018-0245
A vulnerability in the REST API of Cisco 5500 and 8500 Series Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote malicious user to view system information that under normal circumstances should be prohibited. The vulnerability is due to incomplete input...
Cisco Wireless Lan Controller Software 8.3\\(133.0\\)
Cisco Wireless Lan Controller Software 8.5\\(105.0\\)
7.8
CVSSv2
CVE-2018-0252
A vulnerability in the IP Version 4 (IPv4) fragment reassembly function of Cisco 3500, 5500, and 8500 Series Wireless LAN Controller Software could allow an unauthenticated, remote malicious user to cause an affected device to reload unexpectedly, resulting in a denial of service...
Cisco Wireless Lan Controller Software 8.5\\(107.41\\)
Cisco Wireless Lan Controller Software 8.6\\(1.108\\)
Cisco Wireless Lan Controller Software 8.4\\(100.0\\)
Cisco Wireless Lan Controller Software 8.5\\(107.30\\)
2.9
CVSSv2
CVE-2017-13081
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the group key handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Debian Debian Linux 8.0
Freebsd Freebsd 11
Redhat Enterprise Linux Server 7
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd 10.4
Canonical Ubuntu Linux 17.04
Opensuse Leap 42.2
Debian Debian Linux 9.0
Canonical Ubuntu Linux 16.04
Canonical Ubuntu Linux 14.04
Freebsd Freebsd 11.1
Freebsd Freebsd 10
Freebsd Freebsd
Opensuse Leap 42.3
W1.fi Hostapd 2.4
W1.fi Hostapd 2.3
W1.fi Hostapd 0.6.9
W1.fi Hostapd 0.6.8
W1.fi Hostapd 0.4.10
W1.fi Hostapd 0.4.9
W1.fi Hostapd 0.2.8
W1.fi Hostapd 0.2.6
2 Articles
5.4
CVSSv2
CVE-2017-13084
Wi-Fi Protected Access (WPA and WPA2) allows reinstallation of the Station-To-Station-Link (STSL) Transient Key (STK) during the PeerKey handshake, allowing an attacker within radio range to replay, decrypt, or spoof frames.
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 16.04
Freebsd Freebsd 10
Freebsd Freebsd 10.4
Opensuse Leap 42.3
Opensuse Leap 42.2
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 14.04
Redhat Enterprise Linux Server 7
W1.fi Hostapd 2.3
W1.fi Hostapd 2.2
W1.fi Hostapd 0.6.9
W1.fi Hostapd 0.6.8
W1.fi Hostapd 0.4.10
W1.fi Hostapd 0.4.9
W1.fi Hostapd 0.4.8
W1.fi Hostapd 0.2.6
1 Article
2.9
CVSSv2
CVE-2017-13079
Wi-Fi Protected Access (WPA and WPA2) that supports IEEE 802.11w allows reinstallation of the Integrity Group Temporal Key (IGTK) during the four-way handshake, allowing an attacker within radio range to spoof frames from access points to clients.
Debian Debian Linux 9.0
Debian Debian Linux 8.0
Canonical Ubuntu Linux 14.04
Redhat Enterprise Linux Server 7
Freebsd Freebsd 10
Freebsd Freebsd 10.4
Opensuse Leap 42.2
Canonical Ubuntu Linux 17.04
Canonical Ubuntu Linux 16.04
Freebsd Freebsd 11
Freebsd Freebsd 11.1
Redhat Enterprise Linux Desktop 7
Freebsd Freebsd
Opensuse Leap 42.3
W1.fi Hostapd 2.4
W1.fi Hostapd 2.3
W1.fi Hostapd 0.6.10
W1.fi Hostapd 0.6.9
W1.fi Hostapd 0.4.11
W1.fi Hostapd 0.4.10
W1.fi Hostapd 0.4.9
W1.fi Hostapd 0.2.8
2 Articles
6.1
CVSSv2
CVE-2016-9194
A vulnerability in 802.11 Wireless Multimedia Extensions (WME) action frame processing in Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent malicious user to cause a denial of service (DoS) condition. The vulnerability is due to incomplete inpu...
Cisco Wireless Lan Controller 8.1.104.37
Cisco Wireless Lan Controller 6.0 Base
Cisco Wireless Lan Controller 5.2.157.0
Cisco Wireless Lan Controller 7.5.102.11
Cisco Wireless Lan Controller 8.1.111.0
Cisco Wireless Lan Controller 7.0 240.0
Cisco Wireless Lan Controller 7.4 1.19
Cisco Wireless Lan Controller 7.0 220.0
Cisco Wireless Lan Controller 7.0 98.0
Cisco Wireless Lan Controller 7.2 103.0
Cisco Wireless Lan Controller 8.1.0
Cisco Wireless Lan Controller 7.0 252.0
Cisco Wireless Lan Controller 7.5.102.0
Cisco Wireless Lan Controller 6.0 202.0
Cisco Wireless Lan Controller 8.1.122.0
Cisco Wireless Lan Controller 7.3.101.0
Cisco Wireless Lan Controller 8.0.0
Cisco Wireless Lan Controller 7.4.100
Cisco Wireless Lan Controller 8.0.72.140
Cisco Wireless Lan Controller 7.4 Base
Cisco Wireless Lan Controller 7.4.100.60
Cisco Wireless Lan Controller 8.0.0.30220.385
8.3
CVSSv2
CVE-2017-3854
A vulnerability in the mesh code of Cisco Wireless LAN Controller (WLC) software could allow an unauthenticated, remote malicious user to impersonate a WLC in a meshed topology. The vulnerability is due to insufficient authentication of the parent access point in a mesh configura...
Cisco Wireless Lan Controller Software 16.088.0
Cisco Wireless Lan Controller Software 7.0250.0
Cisco Wireless Lan Controller Software 6.0199.4
Cisco Wireless Lan Controller Software 7.0220.0
Cisco Wireless Lan Controller Firmware 8.0.72.140
Cisco Wireless Lan Controller Software 7.41.54
10
CVSSv2
CVE-2015-6314
Cisco Wireless LAN Controller (WLC) devices with software 7.6.x, 8.0 prior to 8.0.121.0, and 8.1 prior to 8.1.131.0 allow remote malicious users to change configuration settings via unspecified vectors, aka Bug ID CSCuw06153.
Cisco Wireless Lan Controller Software 8.0 Base
Cisco Wireless Lan Controller Software 8.1.104.37
Cisco Wireless Lan Controller Software 8.1.0
Cisco Wireless Lan Controller Software 8.1.122.0
Cisco Wireless Lan Controller Software 8.1.111.0
Cisco Wireless Lan Controller Software 8.0.72.140
1 Article
7.8
CVSSv2
CVE-2014-0706
Cisco Wireless LAN Controller (WLC) devices 7.2 prior to 7.2.115.2, 7.3, and 7.4 prior to 7.4.110.0 allow remote malicious users to cause a denial of service (device restart) via a crafted 802.11 Ethernet frame, aka Bug ID CSCue87929.
Cisco Wireless Lan Controller Software 7.2.103.0
Cisco Wireless Lan Controller Software 7.4.100.60
Cisco Wireless Lan Controller Software 7.2.110.0
Cisco Wireless Lan Controller Software 7.3
Cisco Wireless Lan Controller Software 7.3.101.0
Cisco Wireless Lan Controller Software 7.4.100.0
Cisco Wireless Lan Controller Software 7.2
Cisco Wireless Lan Controller
7.8
CVSSv2
CVE-2014-0707
Cisco Wireless LAN Controller (WLC) devices 7.2, 7.3, and 7.4 prior to 7.4.110.0 allow remote malicious users to cause a denial of service (device restart) via a crafted 802.11 Ethernet frame, aka Bug ID CSCuf80681.
Cisco Wireless Lan Controller Software 7.2.103.0
Cisco Wireless Lan Controller Software 7.3
Cisco Wireless Lan Controller Software 7.2
Cisco Wireless Lan Controller Software 7.4.100.0
Cisco Wireless Lan Controller Software 7.4.100.60
Cisco Wireless Lan Controller Software 7.2.110.0
Cisco Wireless Lan Controller Software 7.3.101.0
Cisco Wireless Lan Controller
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »