<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Information request - New vulnerability in WLC in Wireless</title>
    <link>https://community.cisco.com/t5/wireless/information-request-new-vulnerability-in-wlc/m-p/4090765#M4479</link>
    <description>As per Marce1000 list, your current version is affected by the bug, as you are running 8.5.151.0 which is older than the fixed 8.5.160.0.</description>
    <pubDate>Fri, 22 May 2020 14:36:27 GMT</pubDate>
    <dc:creator>patoberli</dc:creator>
    <dc:date>2020-05-22T14:36:27Z</dc:date>
    <item>
      <title>Information request - New vulnerability in WLC</title>
      <link>https://community.cisco.com/t5/wireless/information-request-new-vulnerability-in-wlc/m-p/4089887#M4476</link>
      <description>&lt;P&gt;Hello everyone,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Regarding the vulnerability which was published through the below link, anyone can tell me me please if the versions of both WLCs that we manage are vulnerable ?&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-capwap-dos-Y2sD9uEw" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-capwap-dos-Y2sD9uEw&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;because in the bug link, only the version&amp;nbsp;8.8(120.0) is mentioned.&lt;/P&gt;&lt;P&gt;&lt;A href="https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvq59667" target="_blank"&gt;https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvq59667&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Cisco controllers we manage:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;WLC 1&amp;nbsp;&lt;BR /&gt;Model:&amp;nbsp;Cisco 5508 WLC (5500 serie)&lt;BR /&gt;Version 8.5.151.0&lt;/P&gt;&lt;P&gt;WLC 2&amp;nbsp;&lt;BR /&gt;Model:&amp;nbsp;Cisco 2504 WLC (2500 serie)&lt;BR /&gt;Version&amp;nbsp;8.5.151.0&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jul 2021 19:04:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/information-request-new-vulnerability-in-wlc/m-p/4089887#M4476</guid>
      <dc:creator>akesbi.selma1</dc:creator>
      <dc:date>2021-07-05T19:04:28Z</dc:date>
    </item>
    <item>
      <title>Re: Information request - New vulnerability in WLC</title>
      <link>https://community.cisco.com/t5/wireless/information-request-new-vulnerability-in-wlc/m-p/4089929#M4477</link>
      <description>&amp;gt;From the link you posted, you need to look at the advisory page. That shows the first fixed version and typically anything prior to that is vulnerable. &lt;BR /&gt;</description>
      <pubDate>Thu, 21 May 2020 12:15:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/information-request-new-vulnerability-in-wlc/m-p/4089929#M4477</guid>
      <dc:creator>Scott Fella</dc:creator>
      <dc:date>2020-05-21T12:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: Information request - New vulnerability in WLC</title>
      <link>https://community.cisco.com/t5/wireless/information-request-new-vulnerability-in-wlc/m-p/4090121#M4478</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;Ref&amp;nbsp; :&amp;nbsp;&lt;A href="https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-capwap-dos-Y2sD9uEw#fs" target="_blank"&gt;https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-capwap-dos-Y2sD9uEw#fs&lt;/A&gt;&lt;/P&gt;
&lt;H3&gt;Fixed Releases&lt;/H3&gt;
&lt;SECTION class="bdl_text" data-bdl-txt="WLC Bundle: Fixed SW Table Intro"&gt;
&lt;P&gt;&lt;SPAN&gt;In the following table, the left column lists Cisco software releases. The center column indicates whether a release is affected by the vulnerability described in this advisory and the first release that includes the fix for this vulnerability. The right column indicates whether a release is affected by all the vulnerabilities described in this bundle of advisories and which release includes fixes for those vulnerabilities.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/SECTION&gt;
&lt;DIV class="tblScroller"&gt;
&lt;TABLE width="100%"&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH align="left" valign="top"&gt;Cisco WLC Major Software Release&lt;/TH&gt;
&lt;TH align="left" valign="top"&gt;&lt;STRONG&gt;&lt;U&gt;&lt;FONT color="#008000"&gt;First Fixed&lt;/FONT&gt;&lt;/U&gt; Release for This Vulnerability&lt;/STRONG&gt;&lt;/TH&gt;
&lt;TH align="left" valign="top"&gt;&lt;STRONG&gt;Recommended Release for All Vulnerabilities Described in This Bundle of Advisories&lt;/STRONG&gt;&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD&gt;8.5 and earlier&lt;/TD&gt;
&lt;TD&gt;&lt;U&gt;&lt;STRONG&gt;&lt;FONT color="#008000"&gt;8.5.160.0&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/U&gt;&lt;/TD&gt;
&lt;TD&gt;8.5.161.0&lt;SUP&gt;1&lt;/SUP&gt;&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;FONT color="#000000"&gt;&lt;SPAN class="mce-annotation tox-comment tox-comment--active" data-mce-annotation-uid="CONV-0001042" data-mce-annotation="tinycomments"&gt;8.6&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;&lt;FONT color="#008000"&gt;8.8.130.0&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;8.8.130.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;&lt;FONT color="#000000"&gt;8.7&lt;/FONT&gt;&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;&lt;FONT color="#008000"&gt;8.8.130.0&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;8.8.130.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.8&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;&lt;FONT color="#008000"&gt;8.8.130.0&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;8.8.130.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.9&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;&lt;FONT color="#008000"&gt;8.10.105.0&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;8.10.121.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD&gt;8.10&lt;/TD&gt;
&lt;TD&gt;&lt;STRONG&gt;&lt;FONT color="#008000"&gt;8.10.105.0&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/TD&gt;
&lt;TD&gt;8.10.121.0&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;1. If the deployment is based on a Mobility Express controller, Cisco recommends migrating to Release 8.8.130.0.&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Thu, 21 May 2020 16:47:04 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/information-request-new-vulnerability-in-wlc/m-p/4090121#M4478</guid>
      <dc:creator>Mark Elsen</dc:creator>
      <dc:date>2020-05-21T16:47:04Z</dc:date>
    </item>
    <item>
      <title>Re: Information request - New vulnerability in WLC</title>
      <link>https://community.cisco.com/t5/wireless/information-request-new-vulnerability-in-wlc/m-p/4090765#M4479</link>
      <description>As per Marce1000 list, your current version is affected by the bug, as you are running 8.5.151.0 which is older than the fixed 8.5.160.0.</description>
      <pubDate>Fri, 22 May 2020 14:36:27 GMT</pubDate>
      <guid>https://community.cisco.com/t5/wireless/information-request-new-vulnerability-in-wlc/m-p/4090765#M4479</guid>
      <dc:creator>patoberli</dc:creator>
      <dc:date>2020-05-22T14:36:27Z</dc:date>
    </item>
  </channel>
</rss>

