CVE-2016-9219 (CNNVD-201704-280)
中文标题:
Cisco Wireless LAN Controller 输入验证错误漏洞
英文标题:
A vulnerability with IPv6 UDP ingress packet processing in Cisco Wireless LAN Controller (WLC) Softw...
漏洞描述
中文描述:
Cisco Wireless LAN Controller(WLC)是美国思科(Cisco)公司的一款无线局域网控制器产品。该产品在无线局域网中提供安全策略、入侵检测等功能。 使用8.2.121.0和8.3.102.0版本固件的Cisco WLC中存在拒绝服务漏洞,该漏洞源于程序没有充分的验证IPv6 UDP头。攻击者可通过向特定端口发送特制的IPv6 UDP数据包利用该漏洞造成拒绝服务(设备重载)。
英文描述:
A vulnerability with IPv6 UDP ingress packet processing in Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause an unexpected reload of the device. The vulnerability is due to incomplete IPv6 UDP header validation. An attacker could exploit this vulnerability by sending a crafted IPv6 UDP packet to a specific port on the targeted device. An exploit could allow the attacker to impact the availability of the device as it could unexpectedly reload. This vulnerability affects Cisco Wireless LAN Controller (WLC) running software version 8.2.121.0 or 8.3.102.0. Cisco Bug IDs: CSCva98592.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| cisco | wireless_lan_controller_firmware | 8.2.121.0 | - | - |
cpe:2.3:o:cisco:wireless_lan_controller_firmware:8.2.121.0:*:*:*:*:*:*:*
|
| cisco | wireless_lan_controller_software | 8.3.102.0 | - | - |
cpe:2.3:o:cisco:wireless_lan_controller_software:8.3.102.0:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
CVSS评分详情
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2016-9219 |
2025-11-11 15:19:13 | 2025-11-11 07:34:27 |
| NVD | nvd_CVE-2016-9219 |
2025-11-11 14:55:11 | 2025-11-11 07:43:06 |
| CNNVD | cnnvd_CNNVD-201704-280 |
2025-11-11 15:09:47 | 2025-11-11 07:52:59 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 输入验证错误
- cnnvd_id: 未提取 -> CNNVD-201704-280
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- cvss_version: NOT_EXTRACTED -> 3.0
- affected_products_count: 0 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']