A vulnerability in the traffic stream metrics (TSM) implemented with the Inter-Access Point Protocol (IAPP) of the Cisco Wireless LAN Controller (WLC) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition because the process on the WLC unexpectedly restarts.
The DoS condition could occur when a subsequent Simple Network Management Protocol (SNMP) request is received for TSM information.The device reloads when an SNMP request for TSM information is received.
An attacker could exploit this vulnerability by sending crafted IAPP packets followed by an SNMP request for TSM information to the targeted device.
An exploit could allow the attacker to cause a DoS condition when the WLC unexpectedly restarts.Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.This advisory is available at the following link:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160831-wlc-1