Cisco has released free software updates that address the
vulnerability described in this advisory. Customers may only install and
expect support for software versions and feature sets for which they
have purchased a license. By installing, downloading, accessing, or
otherwise using such software upgrades, customers agree to follow the
terms of the Cisco software license:
Additionally, customers may only download software for which they
have a valid license, procured from Cisco directly, or through a Cisco
authorized reseller or partner. In most cases this will be a maintenance
upgrade to software that was previously purchased. Free security
software updates do not entitle customers to a new software license,
additional software feature sets, or major revision upgrades.
When considering software upgrades, customers are advised to
regularly consult the advisories for Cisco products, which are available
from the Cisco Security Advisories and Alerts page, to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded
contain sufficient memory and confirm that current hardware and
software configurations will continue to be supported properly by the
new release. If the information is not clear, customers are advised to
contact the Cisco Technical Assistance Center (TAC) or their contracted
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco
service contract and customers who make purchases through third-party
vendors but are unsuccessful in obtaining fixed software through their
point of sale should obtain upgrades by contacting the Cisco TAC:
Customers should have the product serial number available and be
prepared to provide the URL of this advisory as evidence of entitlement
to a free upgrade.
To help ensure a complete upgrade solution, consider that this advisory is part of a collection that includes the following advisories:
Customers should upgrade to an appropriate release as indicated in the table in this section. In the following table, the left column lists major releases of Cisco software, and the center column indicates the first minor release that includes the fix for this vulnerability. The right column indicates which release is recommended to address this vulnerability.
|Cisco Wireless LAN Controller Major Software Release||First Fixed Release for This Vulnerability||Recommended Release for This Vulnerability|
|Prior to 8.0||126.96.36.199||188.8.131.52|
|8.8||Not vulnerable||Not vulnerable|