ā03-07-2016 03:13 AM - edited ā07-05-2021 04:43 AM
Is Cisco WLC vulnerable to DROWN attack ?
the cisco security advisor is not very clear abot that and about the steps you must follow to protect the controller.
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160302-openssl
Do I need to disable SSLv2 in the wireless controller?
thanks
ā03-08-2016 01:33 PM
It is since today that the website shows that the WLC is vulnerable. From my own testing the WLC has SSL (version 2 and 3) disabled for the web interface with software 8.0 and higher. You have to turn it on manually with the help of the "config network secureweb xyz" commands. By default it will correctly send a TCP reset if your browser only tries to negotiate SSL and not the current TLS standards.
I'm wondering why they listed the latest release as vulnerable while the default configuration has it disabled for quite some time. Maybe there is another service which uses SSL, but I have no idea what that can be (CAPWAP uses DTLS for example). I guess we have to wait for more information, in the mean time you can use the "show network summary" command to verify that SSL has been disabled for the web interface.
Please rate useful posts... :-)
ā03-08-2016 05:53 PM
Which version of WLC are you using ?
In the document which you had provided has bug related to version 8.3(15.85).
Another BUG for your reference.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide