A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, adjacent wireless attacker to cause a denial of service (DoS) condition.
This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of IPv6 network requests from an associated wireless IPv6 client to an affected device. To associate a client to a device, an attacker may first need to authenticate to the network, or associate freely in the case of a configured open network. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to stop responding, resulting in a DoS condition.
References
| Link | Resource |
|---|---|
| https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-wncd-p6Gvt6HL | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2025-05-07 18:15
Updated : 2025-07-31 16:56
NVD link : CVE-2025-20140
Mitre link : CVE-2025-20140
CVE.ORG link : CVE-2025-20140
JSON object : View
Products Affected
cisco
- ios_xe
- catalyst_9800-80
- catalyst_9800-l
- catalyst_9130axe
- catalyst_9115axe
- catalyst_9115axi
- catalyst_cw9800m
- catalyst_9800-cl_wireless_controllers_for_cloud
- catalyst_cw9800h1
- catalyst_9117axi
- catalyst_9120axe
- catalyst_9105axi
- catalyst_9120axi
- catalyst_9130axi
- catalyst_9120axp
- catalyst_cw9800h2
- catalyst_9800-40
CWE
CWE-789
Memory Allocation with Excessive Size Value
