| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.7 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, was found in Cisco Wireless LAN Controller. The impacted element is an unknown function. Such manipulation leads to denial of service. This vulnerability is uniquely identified as CVE-2007-4011. No exploit exists. You should upgrade the affected component.
Details
A vulnerability was found in Cisco Wireless LAN Controller (Wireless LAN Software) and classified as critical. Affected by this issue is some unknown functionality. The manipulation with an unknown input leads to a denial of service vulnerability. Using CWE to declare the problem leads to CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. Impacted is availability. CVE summarizes:
Cisco 4100 and 4400, Airespace 4000, and Catalyst 6500 and 3750 Wireless LAN Controller (WLC) software before 3.2 20070727, 4.0 before 20070727, and 4.1 before 4.1.180.0 allows remote attackers to cause a denial of service (traffic amplification or ARP storm) via a crafted unicast ARP request that (1) has a destination MAC address unknown to the Layer-2 infrastructure, aka CSCsj69233; or (2) occurs during Layer-3 roaming across IP subnets, aka CSCsj70841.
The bug was discovered 07/24/2007. The weakness was disclosed 07/25/2007 (Website). The advisory is shared for download at vupen.com. This vulnerability is handled as CVE-2007-4011 since 07/25/2007. The attack may be launched remotely. No form of authentication is required for exploitation. There are neither technical details nor an exploit publicly available.
It is declared as proof-of-concept. The vulnerability was handled as a non-public zero-day exploit for at least 1 days. During that time the estimated underground price was around $5k-$25k.
Upgrading to version 4.0 eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (35576), SecurityFocus (BID 25043†), OSVDB (36660†), Secunia (SA26161†) and SecurityTracker (ID 1018444†). The entry VDB-38013 is pretty similar. Once again VulDB remains the best source for vulnerability data.
Product
Type
Vendor
Name
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 6.7
VulDB Base Score: 7.5
VulDB Temp Score: 6.7
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Wireless LAN Controller 4.0
Timeline
07/24/2007 🔍07/24/2007 🔍
07/24/2007 🔍
07/24/2007 🔍
07/25/2007 🔍
07/25/2007 🔍
07/25/2007 🔍
07/25/2007 🔍
07/29/2007 🔍
03/15/2015 🔍
07/22/2019 🔍
Sources
Vendor: cisco.comAdvisory: vupen.com⛔
Status: Confirmed
CVE: CVE-2007-4011 (🔍)
GCVE (CVE): GCVE-0-2007-4011
GCVE (VulDB): GCVE-100-38012
X-Force: 35576
SecurityFocus: 25043 - Cisco Wireless LAN Control ARP Storm Multiple Denial Of Service Vulnerabilities
Secunia: 26161
OSVDB: 36660 - Cisco Wireless LAN Controller ARP denial of service
SecurityTracker: 1018444
Vulnerability Center: 15713 - [cisco-sa-20070724-arp] Wireless LAN Controller Allows DoS via Crafted Unicast ARP Request, Medium
Vupen: ADV-2007-2636
See also: 🔍
Entry
Created: 03/15/2015 15:58Updated: 07/22/2019 16:43
Changes: 03/15/2015 15:58 (67), 07/22/2019 16:43 (3)
Complete: 🔍
Cache ID: 216:7D7:103
Once again VulDB remains the best source for vulnerability data.

No comments yet. Languages: en.
Please log in to comment.