QID 317043
Date Published: 2021-09-23
QID 317043: Cisco Internetwork Operating System (IOS) XE Software for Catalyst 9000 Family Wireless Controllers CAPWAP Remote Code Execution (RCE) Vulnerability (cisco-sa-ewlc-capwap-rce-LYgj8Kf)
A vulnerability in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol processing of
Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated,
remote attacker to execute arbitrary code with administrative privileges
or cause a denial of service (DoS) condition on an affected device.
Affected Products
Following Cisco products if they are running a vulnerable release of Cisco IOS XE Software for Cisco Catalyst 9000 Family Wireless Controllers:
Catalyst 9800 Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches
Catalyst 9800 Series Wireless Controllers
Catalyst 9800-CL Wireless Controllers for Cloud
Embedded Wireless Controller on Catalyst Access Point
QID Detection Logic (Authenticated):
The check matches Cisco IOS XE version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.
A successful exploit could allow the attacker to execute arbitrary code with administrative privileges or cause the
affected device to crash and reload, resulting in a DoS condition.
Customers are advised to refer to cisco-sa-ewlc-capwap-rce-LYgj8Kf for more information.
- cisco-sa-ewlc-capwap-rce-LYgj8Kf -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-capwap-rce-LYgj8Kf
CVEs related to QID 317043
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-ewlc-capwap-rce-LYgj8Kf |
|