var-201604-0560
Vulnerability from variot
Buffer overflow in the redirection functionality in Cisco Wireless LAN Controller (WLC) Software 7.2 through 7.4 before 7.4.140.0(MD) and 7.5 through 8.0 before 8.0.115.0(ED) allows remote attackers to execute arbitrary code via a crafted HTTP request, aka Bug ID CSCus25617. The Cisco WLC is responsible for system-wide wireless LAN functions such as security policy, intrusion protection, RF management, quality of service, and mobility. An attacker can exploit this issue to execute arbitrary code on the affected device. Failed exploit attempts will result in denial-of-service conditions. This issue is being tracked by Cisco bug ID CSCus25617. The following releases are affected: Cisco WLC Release 7.2, Release 7.3, Release 7.4 prior to 7.4.140.0(MD), Release 7.5, Release 7.6, Release 8.0 prior to 8.0.115.0(ED)
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201604-0560",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "wireless lan controller software",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "8.0.115.0"
},
{
"model": "wireless lan controller software",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "7.2.0"
},
{
"model": "wireless lan controller software",
"scope": "gte",
"trust": 1.0,
"vendor": "cisco",
"version": "7.5.0"
},
{
"model": "wireless lan controller software",
"scope": "lt",
"trust": 1.0,
"vendor": "cisco",
"version": "7.4.140.0"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "8.0.115.0(ed)"
},
{
"model": "wireless lan controller software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "7.4"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "all 7.5 release"
},
{
"model": "wireless lan controller software",
"scope": "lt",
"trust": 0.8,
"vendor": "cisco",
"version": "8.0"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "all 7.2 release"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "all 7.3 release"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "all 7.6 release"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.8,
"vendor": "cisco",
"version": "7.4.140.0(md)"
},
{
"model": "wireless lan controller 8.0\u003c8.0.110.0",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "wireless lan controller",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.6"
},
{
"model": "wireless lan controller",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.5"
},
{
"model": "wireless lan controller 7.4\u003c7.4.130.0",
"scope": null,
"trust": 0.6,
"vendor": "cisco",
"version": null
},
{
"model": "wireless lan controller",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.3"
},
{
"model": "wireless lan controller",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.2"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.5.102.0"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.4.100"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "8.0.72.140"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.4.1.19"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.4.1.54"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "8.1.0"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.4.100.60"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.6.1.62"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.5.102.11"
},
{
"model": "wireless lan controller software",
"scope": "eq",
"trust": 0.6,
"vendor": "cisco",
"version": "7.4.1.1"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
},
{
"db": "NVD",
"id": "CVE-2016-1363"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:cisco:wireless_lan_controller_software",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco",
"sources": [
{
"db": "BID",
"id": "86761"
}
],
"trust": 0.3
},
"cve": "CVE-2016-1363",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2016-1363",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CNVD-2016-02518",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-90182",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2016-1363",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2016-1363",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-1363",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2016-1363",
"trust": 0.8,
"value": "Critical"
},
{
"author": "CNVD",
"id": "CNVD-2016-02518",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-201604-512",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-90182",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "VULHUB",
"id": "VHN-90182"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
},
{
"db": "NVD",
"id": "CVE-2016-1363"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer overflow in the redirection functionality in Cisco Wireless LAN Controller (WLC) Software 7.2 through 7.4 before 7.4.140.0(MD) and 7.5 through 8.0 before 8.0.115.0(ED) allows remote attackers to execute arbitrary code via a crafted HTTP request, aka Bug ID CSCus25617. The Cisco WLC is responsible for system-wide wireless LAN functions such as security policy, intrusion protection, RF management, quality of service, and mobility. \nAn attacker can exploit this issue to execute arbitrary code on the affected device. Failed exploit attempts will result in denial-of-service conditions. \nThis issue is being tracked by Cisco bug ID CSCus25617. The following releases are affected: Cisco WLC Release 7.2, Release 7.3, Release 7.4 prior to 7.4.140.0(MD), Release 7.5, Release 7.6, Release 8.0 prior to 8.0.115.0(ED)",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-1363"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "BID",
"id": "86761"
},
{
"db": "VULHUB",
"id": "VHN-90182"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-1363",
"trust": 3.4
},
{
"db": "SECTRACK",
"id": "1035633",
"trust": 1.7
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2016-02518",
"trust": 0.6
},
{
"db": "BID",
"id": "86761",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-90182",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "VULHUB",
"id": "VHN-90182"
},
{
"db": "BID",
"id": "86761"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
},
{
"db": "NVD",
"id": "CVE-2016-1363"
}
]
},
"id": "VAR-201604-0560",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "VULHUB",
"id": "VHN-90182"
}
],
"trust": 1.2343109399999999
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
}
]
},
"last_update_date": "2024-11-23T22:18:16.060000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "cisco-sa-20160420-htrd",
"trust": 0.8,
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160420-htrd"
},
{
"title": "Patch for Cisco WirelessLANController Denial of Service Vulnerability (CNVD-2016-02518)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/74743"
},
{
"title": "Cisco Wireless LAN Controller redirection Fixes for feature buffer overflow vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=61201"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-399",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-90182"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "NVD",
"id": "CVE-2016-1363"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.3,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160420-htrd"
},
{
"trust": 1.7,
"url": "http://www.securitytracker.com/id/1035633"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-1363"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-1363"
},
{
"trust": 0.3,
"url": "http://www.cisco.com/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "VULHUB",
"id": "VHN-90182"
},
{
"db": "BID",
"id": "86761"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
},
{
"db": "NVD",
"id": "CVE-2016-1363"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"db": "VULHUB",
"id": "VHN-90182"
},
{
"db": "BID",
"id": "86761"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
},
{
"db": "NVD",
"id": "CVE-2016-1363"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"date": "2016-04-21T00:00:00",
"db": "VULHUB",
"id": "VHN-90182"
},
{
"date": "2016-04-20T00:00:00",
"db": "BID",
"id": "86761"
},
{
"date": "2016-04-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"date": "2016-04-22T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-512"
},
{
"date": "2016-04-21T11:00:01.587000",
"db": "NVD",
"id": "CVE-2016-1363"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-04-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2016-02518"
},
{
"date": "2016-12-03T00:00:00",
"db": "VULHUB",
"id": "VHN-90182"
},
{
"date": "2016-04-20T00:00:00",
"db": "BID",
"id": "86761"
},
{
"date": "2016-04-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-002340"
},
{
"date": "2021-04-19T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201604-512"
},
{
"date": "2024-11-21T02:46:15.613000",
"db": "NVD",
"id": "CVE-2016-1363"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Cisco Wireless LAN Controller Software redirection buffer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-002340"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "resource management error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201604-512"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.