Wireless LAN Controllers: Device Administration with Cisco WLC

0 Comments

Wireless LAN Controller

At last, there is a specific DoS disadvantage that influences some Aironet gadgets. CVE-2019-15262 influences the SSH session management of CSH Wireless LAN Controller (WLC) software, it should also be fixed through software updates.

Cisco provides different security cautions on wireless transmitters 

Cisco has cautioned of different vulnerabilities in some wireless access points and LAN transmitters, from allowing attackers to dispatch a DDOS attack to startlingly rebooting devices. 

The lone basic warning came for vulnerabilities in the Cisco Wave 2 Aironet 1830 Series and Cisco Aironet 1850 Series Access Points. 

As per Cisco – the vulnerability is because of the accessibility of standard documentation for an influenced device running Cisco Mobility Express Software, whether or not the device is configured as an expert, subordinate, or free access point. An attacker who has a 3-way connection with an influenced device can use Secure Shell (SSH) to access the device with high advantages. An effective operation can allow an attacker to play full responsibility for the device.

Cisco said it has delivered software updates to address this vulnerability. 

Then, in the “High Warning” category, Cisco said that a vulnerability in the web management interface of the Cisco Wireless LAN Controller (WLC) Software could prompt an unapproved remote service attacker (DoS) circumstance on an influenced device.

Cisco also mentioned the vulnerability is because of the lack of an internal request for a particular request. An attacker could abuse this vulnerability by entering a particular URL covered up in the web management interface. An effective operation could allow the attacker to reload the device to make it a DoS necessity.

Cisco said an update is accessible to address this issue. 

Also in the High Warning classification, Cisco said that a vulnerability in the processing of IPv6 UDP input packets in the Cisco Wireless LAN Controller (WLC) software could result in a surprising and remote attack by a poor attacker on the device.

The vulnerability is an inadequate approval of the IPv6 UDP header. An attacker could take advantage of this vulnerability by sending a created IPv6 UDP packet to a particular port on the sent device.

Cisco has delivered software updates to address this vulnerability. 

The last “High” cautioning is addressed in the processing of the 802.11 Wireless Multimedia Extensions (WME) operation structure in the Cisco Wireless LAN Controller (WLC) software. There the vulnerability could result in a disavowal of service (DoS) condition by an unauthenticated side attacker.

Cisco wrote the vulnerability is because of the approval of the 802.11 WME package header entry. An attacker could take advantage of this vulnerability by sending it to a weakly shaped 802.11 WME frame. An effective operation could make the attacker coincidentally reload WLC.

Cisco WLC management of devices

The SourceFire / Cisco FirePower Manager software and Cisco Wireless LAN controllers required me to dive deep into AAA device management. In response to others’ interest, I decided to write this blog entry to share my experience.

The Cisco WLC’s Device Admin AAA works

A command-line license is available for Cisco Device Management with the Catalyst version. WLCs, however, are based on registries. Rather, it prevents changes from being saved when changes are made within an unauthorized section of a table.

A user’s authorization results from the TACACS + Server must list the menus that they are allowed to make changes to internally. 

The following are the responsibilities of Cisco WLC:

  • WLAN
  • CONTROLLER
  • WIRELESS
  • SECURITY
  • MANAGEMENT
  • COMMANDS

Some roles are not interchangeable with others:

  • LOBBY – Allows access to Lobby Ambassador functions.
  • EVERYTHING – Just as it sounds. All menus.

Are you a good candidate for Cisco Mobility Express?

Our customers are thinking about their wireless infrastructure a lot in 2018. Cisco says it is the “leader in value” for WLAN 802.11ac wave 2 devices and has kept the ground afloat.

For this, Cisco offers Mobility Express, a solution that simplifies wireless LAN (WLAN) network setup. How does it work? Do you need it?

How does Mobility Express work?

APS can be used as a controller by Mobile Express. Thus, no control boxes are required. An AP acts as a controller instead. Cisco explains this as follows:

Using Mobility Express, Cisco Aironet 3800, 2800, 1850, 1830, 1815, 1560, and 1540 Series Access Points can control wireless LANs (WLANs). As such, Mobility Express is part of a series. IEEE 802.11 WLAN controllers are being converted into software applications that any network component can use. Private cloud, public cloud, Cisco switches, Cisco routers, and WebLogic controllers, or WLCs.

What is the best way to lead Mobility Express?

The following methods can be used to manage Mobility Express:

  • Web User Interface for Cisco Mobility Express
  • Cisco Wireless mobile application (available on Apple App Store and Google Play Store for free)
  • Cisco Prime Infrastructure, Release 3.0.1 or newer
  • Cisco command-line interface (CLI) via cone cable, SSH, or Telnet

API limitations

In Mobility Express networks with more than 50 access points, the Master AP (running WLAN controller function) can serve a maximum of 20 clients. Access points in the Mobility Express network are not affected by this limitation, only the master API.

On the wireless device, Cisco issues a variety of security alerts

Cisco has warned of a variety of vulnerabilities in some of its wireless network access points and LAN devices, from allowing an attacker to conduct a DDOS attack to unexpected device reloads.

The only critical alert related to the Cisco Wave 2 Aironet 1830 Series and Cisco Aironet 1850 Series access points.

Cisco Mobility Express devices are vulnerable to vulnerability, which allows unauthenticated remote attackers to take complete control of the device.

In Cisco Mobility Express, the vulnerability is caused by the existence of default credentials regardless of whether the device is configured as a master, slave, or standalone access point. 

Secure Shell (SSH) could be used by an attacker with a Layer 3 connection to log on to an elevated device. Cisco warned that a successful exploit could allow an attacker to take complete control of a device.

A software update has been released by Cisco to address this vulnerability.

An unauthenticated remote attacker might be able to cause a denial of service (DoS) condition on the affected device due to a vulnerability in Cisco Wireless LAN Controller (WLC) web management interface, Cisco warned in a “High” warning category.

Read More

Tags: , ,