In association with heise online

13 April 2007, 12:34

Latest Cisco WLAN latest vulnerabilities fixed

  • Twitter
  • Facebook
  • submit to slashdot
  • StumbleUpon
  • submit to reddit

Cisco has released patches for several internally discovered vulnerabilities in its Aironet Lightweight Access Points, WLC access point controllers and WCS WLAN management software, which provides monitoring, support and management services for Cisco wireless networking.

The Aironet LAPs have a common hard-coded service password. Models 1000 and 1500 are affected. The WLC uses well-known default SNMP community strings, can lock up due to malformed traffic, and fails to apply WLAN ACLs on reboot. Models 4400, 2100 and the Wireless LAN Controller Module are affected, as are WLAN modules and controllers for the Catalyst 6500 and 3750 product ranges.

The WCS has fixed user credentials for its backup ftp service, suffers from a privilege escalation vulnerability that allows group membership to be changed by users, and can be persuaded to disclose network topology information to unauthenticated users. All versions prior to 4.0.96.0 are affected.

Cisco has made free software available to affected customers to address all these vulnerabilities, and has base scored several of them (notably those affecting credentials) at between 5 to 10 on the CVSS. Applying these patches must therefore be considered a high priority for affected users.

See also:

(mba)

Print Version | Send by email | Permalink: http://h-online.com/-732639
 


  • July's Community Calendar





The H Open

The H Security

The H Developer

The H Internet Toolkit