2
CVSSv3

CVE-2010-3034

CVSSv4: NA | CVSSv3: 2 | CVSSv2: 5 | VMScore: 600 | EPSS: 0.0026 | KEV: Not Included
Published: 10/09/2010 Updated: 21/11/2024

Vulnerability Summary

ACL Bypass Vulnerability in Cisco WLC Software Allows Network Traffic Redirection

Cisco Wireless LAN Controller (WLC) software, versions 6.0.x or between 4.1 and 6.0.x, has an issue. Remote attackers can bypass the ACLs in the controller CPU. This lets them send network traffic to wrong segments or devices. The exact method is not specified. This vulnerability is different from CVE-2010-0575.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco wireless lan controller software 4.2

cisco wireless lan controller software 4.2.61.0

cisco wireless lan controller software 4.2.99.0

cisco wireless lan controller software 4.2.112.0

cisco wireless lan controller software 4.2.117.0

cisco wireless lan controller software 4.2.130.0

cisco wireless lan controller software 4.2.173.0

cisco wireless lan controller software 4.2.174.0

cisco wireless lan controller software 4.2.176.0

cisco wireless lan controller software 4.2.182.0

cisco wireless lan controller software 5.0.148.0

cisco wireless lan controller software 5.0.148.2

cisco wireless lan controller software 5.1

cisco wireless lan controller software 5.1.151.0

cisco wireless lan controller software 5.1.152.0

cisco wireless lan controller software 5.1.160.0

cisco wireless lan controller software 6.0

cisco wireless lan controller software 6.0.182.0

Vendor Advisories

The Cisco Wireless LAN Controller (WLC) product family is affected by these vulnerabilities: Two denial of service (DoS) vulnerabilities Three privilege escalation vulnerabilities Two access control list (ACL) bypass vulnerabilities Note: These vulnerabilities are independent of one another A device may be a ...