Vulnerability Details : CVE-2015-6258
The Internet Access Point Protocol (IAPP) module on Cisco Wireless LAN Controller (WLC) devices with software 8.1(104.37) allows remote attackers to trigger incorrect traffic forwarding via crafted IPv6 packets, aka Bug ID CSCuv40033.
Vulnerability category: Input validation
Products affected by CVE-2015-6258
- cpe:2.3:o:cisco:wireless_lan_controller_software:8.1.104.37:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-6258
0.12%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 44 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-6258
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2015-6258
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-6258
-
http://tools.cisco.com/security/center/viewAlert.x?alertId=40586
Cisco Wireless LAN Controller IPv6 IAPP WIPS Report VulnerabilityVendor Advisory
-
http://www.securitytracker.com/id/1033360
Cisco Wireless LAN Controller IAPP Input Validation Flaw Lets Remote Users Forward Network Traffic to Other Destinations - SecurityTrackerThird Party Advisory;VDB Entry
Jump to