Vulnerabilities > Cisco > Wireless LAN Controller Software > Medium

DATE CVE VULNERABILITY TITLE RISK
2010-09-10 CVE-2010-0575 Permissions, Privileges, and Access Controls vulnerability in Cisco Wireless LAN Controller Software
Cisco Wireless LAN Controller (WLC) software, possibly 6.0.x or possibly 4.1 through 6.0.x, allows remote attackers to bypass ACLs in the controller CPU, and consequently send network traffic to unintended segments or devices, via unspecified vectors, a different vulnerability than CVE-2010-3034.
network
low complexity
cisco CWE-264
5.0
2009-02-05 CVE-2009-0058 Improper Input Validation vulnerability in Cisco products
The Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.x before 4.2.176.0 and 5.x before 5.2 allow remote attackers to cause a denial of service (web authentication outage or device reload) via unspecified network traffic, as demonstrated by a vulnerability scanner.
low complexity
cisco CWE-20
6.1
2007-04-16 CVE-2007-2040 Remote vulnerability in Cisco Wireless Lan Controller
Cisco Aironet 1000 Series and 1500 Series Lightweight Access Points before 3.2.185.0, and 4.0.x before 4.0.206.0, have a hard-coded password, which allows attackers with physical access to perform arbitrary actions on the device, aka Bug ID CSCsg15192.
local
high complexity
cisco
6.2
2007-04-16 CVE-2007-2039 Resource Management Errors vulnerability in Cisco Wireless LAN Controller Software
The Network Processing Unit (NPU) in the Cisco Wireless LAN Controller (WLC) before 3.2.171.5, 4.0.x before 4.0.206.0, and 4.1.x allows remote attackers on a local wireless network to cause a denial of service (loss of packet forwarding) via (1) crafted SNAP packets, (2) malformed 802.11 traffic, or (3) packets with certain header length values, aka Bug IDs CSCsg15901 and CSCsh10841.
low complexity
cisco CWE-399
6.1