Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2018-0442

Опубликовано: 17 окт. 2018
Источник: nvd
CVSS3: 7.5
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to retrieve memory contents, which could lead to the disclosure of confidential information. The vulnerability is due to insufficient condition checks in the part of the code that handles CAPWAP keepalive requests. An attacker could exploit this vulnerability by sending a crafted CAPWAP keepalive packet to a vulnerable Cisco WLC device. A successful exploit could allow the attacker to retrieve the contents of device memory, which could lead to the disclosure of confidential information.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*
Версия до 8.2.170.0 (исключая)
Конфигурация 2

Одно из

cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*
Версия от 8.3 (включая) до 8.3.140.0 (исключая)
cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*
Версия от 8.4 (включая) до 8.5.110.0 (исключая)
cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*
Версия от 8.6 (включая) до 8.6.101.0 (исключая)
cpe:2.3:o:cisco:wireless_lan_controller_software:*:*:*:*:*:*:*:*
Версия от 8.7 (включая) до 8.7.102.0 (исключая)

EPSS

Процентиль: 78%
0.01167
Низкий

7.5 High

CVSS3

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-200
NVD-CWE-noinfo

Связанные уязвимости

CVSS3: 7.5
github
больше 3 лет назад

A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol component of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to retrieve memory contents, which could lead to the disclosure of confidential information. The vulnerability is due to insufficient condition checks in the part of the code that handles CAPWAP keepalive requests. An attacker could exploit this vulnerability by sending a crafted CAPWAP keepalive packet to a vulnerable Cisco WLC device. A successful exploit could allow the attacker to retrieve the contents of device memory, which could lead to the disclosure of confidential information.

CVSS3: 7.5
fstec
больше 7 лет назад

Уязвимость реализации процедуры анализа запросов CAPWAP Discovery Request контроллера беспроводного доступа Cisco Wireless LAN Controller, позволяющая нарушителю раскрыть защищаемую информацию

EPSS

Процентиль: 78%
0.01167
Низкий

7.5 High

CVSS3

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-200
NVD-CWE-noinfo