Note:
This project will be discontinued after December 13, 2021. [more]
Product:
4400_wireless_lan_controller
(Cisco)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 16 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2012-03-01 | CVE-2012-0368 | The administrative management interface on Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.0, 7.1 before 7.1.91.0, and 7.2 before 7.2.103.0 allows remote attackers to cause a denial of service (device crash) via a malformed URL in an HTTP request, aka Bug ID CSCts81997. | 2000_wireless_lan_controller, 2100_wireless_lan_controller, 2106_wireless_lan_controller, 2112_wireless_lan_controller, 2125_wireless_lan_controller, 2500_wireless_lan_controller, 2504_wireless_lan_controller, 4100_wireless_lan_controller, 4400_wireless_lan_controller, 4402_wireless_lan_controller, 4404_wireless_lan_controller, 5508_wireless_controller, Wireless_lan_controller_software | N/A | ||
2009-02-04 | CVE-2009-0061 | Unspecified vulnerability in the Wireless LAN Controller (WLC) TSEC driver in the Cisco 4400 WLC, Cisco Catalyst 6500 and 7600 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.1 allows remote attackers to cause a denial of service (device crash or hang) via unknown IP packets. | 4400_wireless_lan_controller, Catalyst_3750_series_integrated_wireless_lan_controller, Catalyst_6500_series_integrated_wireless_lan_controller, Catalyst_7600_series_wireless_lan_controller, Wireless_lan_controller_software | N/A | ||
2009-02-04 | CVE-2009-0059 | The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.2.x before 5.2.157.0 allow remote attackers to cause a denial of service (device reload) via a web authentication (aka WebAuth) session that includes a malformed POST request to login.html. | 4400_wireless_lan_controller, Catalyst_3750_series_integrated_wireless_lan_controller, Catalyst_6500_series_integrated_wireless_lan_controller, Catalyst_7600_series_wireless_lan_controller, Wireless_lan_controller_software | N/A | ||
2009-02-04 | CVE-2009-0058 | The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.2 allow remote attackers to cause a denial of service (web authentication outage or device reload) via unspecified network traffic, as demonstrated by a vulnerability scanner. | 4400_wireless_lan_controller, Catalyst_3750_series_integrated_wireless_lan_controller, Catalyst_6500_series_integrated_wireless_lan_controller, Catalyst_7600_series_wireless_lan_controller, Wireless_lan_controller_software | N/A | ||
2007-04-16 | CVE-2007-2041 | Cisco Wireless LAN Controller (WLC) before 4.0.206.0 saves the WLAN ACL configuration with an invalid checksum, which prevents WLAN ACLs from being loaded at boot time, and might allow remote attackers to bypass intended access restrictions, aka Bug ID CSCse58195. | 2100_wireless_lan_controller, 4400_wireless_lan_controller | N/A | ||
2007-04-16 | CVE-2007-2038 | The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.193.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1) crafted SNAP packets, (2) malformed 802.11 traffic, or (3) packets with certain header length values, aka Bug ID CSCsg36361. | 2000_wireless_lan_controller, 2100_wireless_lan_controller, 4100_wireless_lan_controller, 4400_wireless_lan_controller | N/A |