01-14-2016 03:16 AM - edited 03-20-2019 08:49 PM
An attacker who can connect to an affected device could exploit this vulnerability.
I'm missing the information about how this bug can be exploited. Can this be exploited trough admin gui? ssh access? captive portal login? capwap tunnel to WLC?
01-14-2016 04:42 AM
yes, me too.
01-14-2016 04:52 AM
and me
01-14-2016 10:25 AM
Maybe someone from Cisco can reply to this, but I'm afraid that not much info will be given because of the risk that exploits will show up in the wild. From what I have found is having IP access to the management-plane of the WLC engough. If you have this secured by a firewall you are still vulnerable if you are using local webauth for layer 3 authentication.
Please rate useful posts... :-)
01-14-2016 05:49 PM
01-19-2016 06:48 PM
and me , too
01-20-2016 02:47 AM
> CSCuw06153 - unauthorized configuration change for web management
it is not clear in the bug description
the title refers to the admin GUI.
02-25-2016 07:04 AM
If it was Webauth they would ask you to disable it as a workaround.
There is no workaround.
No info = Not good news.
Assume it is any IP packet that transit the WLC.
/Ralph
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide