Release date:
Updated on:
Affected Systems:
Cisco Wireless LAN Control 7.2
Cisco Wireless LAN Control 7.1
Cisco Wireless LAN Control 7.0
Unaffected system:
Cisco Wireless LAN Control 7.2.103.0
Cisco Wireless LAN Control 7.1.91.0
Cisco Wireless LAN Control 7.0.220.0
Description:
--------------------------------------------------------------------------------
Bugtraq id: 57524
CVE (CAN) ID: CVE-2013-1104
Cisco WLC is responsible for system-wide wireless LAN functions, such as security policies, intrusion protection, RF management, service quality and mobility.
A remote code execution vulnerability exists in the HTTP configuration function of the Cisco WLC device, which allows authenticated remote attackers to execute arbitrary code on the affected device through a specially crafted UserAgent string.
This vulnerability is only affected when the HTTP Profiling feature is enabled on the device. You can use show wlan to check whether HTTP Profiling is enabled on the device. An example is as follows:
--------------------------------------------------------------------
(WLC)> show wlan 3
WLAN Identifier...
<Output suppressed>
Network Admission Control
Client Profiling Status...
DHCP ....................................... .. disabled
HTTP ....................................... .. enabled
<Output suppressed>
--------------------------------------------------------------------
<* Source: Cisco
Link: http://seclists.org/fulldisclosure/2013/Jan/208
Http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Cisco
-----
Cisco has released a Security Bulletin (cisco-sa-20130123-wlc) and patches for this:
Cisco-sa-20130123-wlc: Multiple Vulnerabilities in Cisco Wireless LAN Controllers
Link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130123-wlc