6.8
CVSSv2

CVE-2013-6684

Published: 13/11/2013 Updated: 14/11/2013
CVSS v2 Base Score: 6.8 | Impact Score: 6.9 | Exploitability Score: 8
VMScore: 605
Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C

Vulnerability Summary

A vulnerability in the web framework of the Cisco Wireless LAN Controller (WLC) could allow an authenticated, remote malicious user to create a denial of service (DoS) condition. The vulnerability is due to improper input validation of configuration parameters. An attacker could exploit this vulnerability by sending a crafted HTTP request to the Cisco WLC. Cisco has confirmed the vulnerability in a security notice; however, software updates are not available. To exploit this vulnerability, an attacker would need to authenticate to the targeted device in order to send crafted HTTP requests to the vulnerable system. This access requirement decreases the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco wireless lan controller

Vendor Advisories

A vulnerability in the web framework of the Cisco Wireless LAN Controller (WLC) could allow an authenticated, remote attacker to create a denial of service (DoS) condition The vulnerability is due to improper input validation of configuration parameters An attacker could exploit this vulnerability by sending a crafted HTTP request to the Cisco W ...