Cisco Warns Of Security Hole In Its WLAN Management Products

security advisory

Specifically, the company said that a default user name/ password pair has been hard coded into the Wireless LAN Solution Engine (WLSE) and some releases Hosting Solution Engine (HSE). WLSE is Cisco's primary tool for centrally managing WLANs and HSE is a hardware-based product that manages e-businesses services.

"Any user who logs in using this username has complete control of the device," the company said in its advisory. The company said that the problem when applied to WLSE means that somebody could hide a rogue access point or change the radio frequency plan, which can lead to problems such as denial-of-service (DoS) attacks. For HSE, the problem can lead to re-direction of a Web site to another URL.

"In both cases the device itself may be used as a launching platform for further attacks. Such attacks could be directed at your organization, or towards a third party," Cisco said in its advisory. It stressed, however, that it knew of no instances of malicious use of the problem.

The vulnerability is in WLSE versions 2.0, 2.0.2 and 2.5 and HSE versions 1.7 through 1.7.3.

id
unit-1659132512259
type
Sponsored post

The company said that there are no workarounds for the problem using existing software but that patches to solve the problem are available for both WSLE and HSE.

This story courtesy of MobilePipeline.