A vulnerability with IPv6 UDP ingress packet processing in Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to cause an unexpected reload of the device. The vulnerability is due to incomplete IPv6 UDP header validation. An attacker could exploit this vulnerability by sending a crafted IPv6 UDP packet to a specific port on the targeted device. An exploit could allow the attacker to impact the availability of the device as it could unexpectedly reload. This vulnerability affects Cisco Wireless LAN Controller (WLC) running software version 8.2.121.0 or 8.3.102.0. Cisco Bug IDs: CSCva98592.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2017-04-06T18:00:00

Updated: 2024-08-06T02:42:11.275Z

Reserved: 2016-11-06T00:00:00

Link: CVE-2016-9219

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-04-06T18:59:00.260

Modified: 2024-11-21T03:00:49.207

Link: CVE-2016-9219

cve-icon Redhat

No data.