Conditions
Following Fixes are committed:
CSCvz99036 Cisco Access Points VLAN Bypass from Native VLAN Vulnerability
CSCwd37092 Slow TCP downloads, failing TLS authentications in 8.10.181.0/17.3.6 - 2800/3800/4800 series
CSCwc78435 9130 sending incorrect channel list on out of band DFS event causing client connectivity issues
Workaround
If a customer has any of the bug fixes required on AP. They can install the APSP. To install APSP, customer has to make sure WLC is on 17.3.6 and follow following APSP upgrade procedure.
https://www.cisco.com/c/dam/en/us/td/docs/wireless/controller/9800/17-1/deployment-guide/c9800-ha-rau-apsp-apdp-issu-rel-17-1.pdf
(Page 6)
Further Problem Description
PSIRT Evaluation:
The Cisco PSIRT has evaluated this issue and determined it does not meet the criteria for PSIRT ownership or involvement. This issue will be addressed via normal resolution channels.
If you believe that there is new information that would cause a change in the severity of this issue, please contact psirt@cisco.com for another evaluation.
Additional information on Cisco's security vulnerability policy can be found at the following URL:
http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html