Cisco issues one critical warning for vulnerability in Aironet 1830 Series and 1850 Series Access Points Cisco warned of a variety of vulnerabilities – from letting attackers issue DDOS attack to making devices unexpectedly reload — in some of its wireless access point and LAN gear.The only critical alert came for vulnerability in Cisco Wave 2 Aironet 1830 Series and Cisco Aironet 1850 Series Access Points.In those devices, running Cisco Mobility Express Software, a vulnerability could let an unauthenticated, remote attacker take complete control of an affected device, the company stated.+More on Network World: Cisco expands wireless reach with access points, management software+ “The vulnerability is due to the existence of default credentials for an affected device that is running Cisco Mobility Express Software, regardless of whether the device is configured as a master, subordinate, or standalone access point. An attacker who has layer 3 connectivity to an affected device could use Secure Shell (SSH) to log in to the device with elevated privileges. A successful exploit could allow the attacker to take complete control of the device,” Cisco wrote in the warning.Cisco said it has released software updates to address this vulnerability. Meanwhile in the “High” warning category Cisco said a vulnerability in the web management interface of Cisco Wireless LAN Controller (WLC) Software could let an unauthenticated, remote attacker cause a denial of service (DoS) condition on an affected device.+More on Network World: Cisco/AppDynamics upgrade broadens DevOps role in app management game+“The vulnerability is due to a missing internal handler for the specific request. An attacker could exploit this vulnerability by accessing a specific hidden URL on the web management interface. A successful exploit could allow the attacker to cause a reload of the device, resulting in a DoS condition,” Cisco wrote.An update is available to address this problem Cisco said.Also in the High warning category Cisco said a vulnerability with IPv6 UDP ingress packet processing in Cisco Wireless LAN Controller (WLC) Software could let an unauthenticated, remote attacker cause an unexpected reload of the device.“The vulnerability is due to incomplete IPv6 UDP header validation. An attacker could exploit this vulnerability by sending a crafted IPv6 UDP packet to a specific port on the targeted device. An exploit could allow the attacker to impact the availability of the device as it could unexpectedly reload,” Cisco wrote. Cisco has released software updates that address this vulnerability as well.The final “High” warning is addressed at the 802.11 Wireless Multimedia Extensions (WME) action frame processing in Cisco Wireless LAN Controller (WLC) Software. There a vulnerability could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition.“The vulnerability is due to incomplete input validation of the 802.11 WME packet header. An attacker could exploit this vulnerability by sending malformed 802.11 WME frames to a targeted device. A successful exploit could allow the attacker to cause the WLC to reload unexpectedly,” Cisco wrote.Cisco has released software updates that address this vulnerability. The last warning came for a vulnerability in RADIUS Change of Authorization (CoA) request processing in the Cisco Wireless LAN Controller (WLC). This flaw could let an unauthenticated, remote attacker cause a denial of service (DoS) condition by disconnecting a single connection.Cisco wrote: “The vulnerability is due to lack of proper input validation of the RADIUS CoA packet header. An attacker could exploit this vulnerability by sending a crafted RADIUS CoA packet to a targeted device. A successful exploit could allow the attacker to disconnect a connection through the WLC unexpectedly,” Cisco wrote.In this case, there are no workarounds available, Cisco said. Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe