Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Device (Router/Bridge/Hub)  >   Cisco Wireless LAN Controller Vendors:   Cisco
Cisco Wireless LAN Controller Mesh Code Authentication Flaw Lets Remote Users Spoof WLC Devices
SecurityTracker Alert ID:  1038041
SecurityTracker URL:
CVE Reference:   CVE-2017-3854   (Links to External Site)
Date:  Mar 15 2017
Impact:   Disclosure of user information, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in Cisco Wireless LAN Controller. A remote user can spoof the target device.

A remote user can exploit an authentication flaw in the mesh code to impersonate a Wireless LAN Controller (WLC) device in a meshed topology. This can be exploited to control the traffic flowing through the target access point or take full control of the target system.

The following models are affected:

8500 Series
5500 Series
2500 Series
Flex 7500 Series

The vendor has assigned bug IDs CSCuc98992 and CSCuu14804 to this vulnerability.

Impact:   A remote user can spoof a WLC device.
Solution:   The vendor has issued a fix.

The vendor advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Authentication error

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, LLC