Vulnerability Description
A vulnerability in RADIUS Change of Authorization (CoA) request processing in the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition by disconnecting a single connection. This vulnerability affects Cisco Wireless LAN Controller running software release 8.3.102.0. More Information: CSCvb01835. Known Fixed Releases: 8.4(1.49) 8.3(111.0) 8.3(108.0) 8.3(104.24) 8.3(102.3).
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Wireless Lan Controller | 8.3.102.0 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/97425Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038188
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2Vendor Advisory
- http://www.securityfocus.com/bid/97425Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1038188
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2Vendor Advisory
FAQ
What is CVE-2016-9195?
CVE-2016-9195 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A vulnerability in RADIUS Change of Authorization (CoA) request processing in the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, remote attacker to cause a denial of service (DoS)...
How severe is CVE-2016-9195?
CVE-2016-9195 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-9195?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Wireless Lan Controller.