First published: Thu Feb 05 2009(Updated: )
Unspecified vulnerability in the Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.2.173.0 allows remote authenticated users to gain privileges via unknown vectors, as demonstrated by escalation from the (1) Lobby Admin and (2) Local Management User privilege levels.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controller software 7.1 | =4.2 | |
Cisco Catalyst 6500 Wireless Services Module | =4.2.173.0 | |
Cisco Catalyst 3750 Series Integrated Wireless LAN Controller | =4.2.173.0 | |
Cisco Catalyst 6500 Wireless Services Module | =4.2 | |
Cisco Catalyst 3750 Series Integrated Wireless LAN Controller | =4.2 | |
Cisco Wireless LAN Controller software 7.1 | =4.2.173.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0062 has been classified with a medium severity level due to its impact on the privileges of authenticated users.
To fix CVE-2009-0062, it is recommended to upgrade to the latest patched version of the affected Cisco software.
CVE-2009-0062 affects Cisco Wireless LAN Controllers, Cisco Catalyst 6500 Wireless Services Modules, and Catalyst 3750 Integrated Wireless LAN Controllers running specific versions of software 4.2.
CVE-2009-0062 can be exploited by remote authenticated users who leverage the vulnerability to gain elevated privileges.
The consequences of CVE-2009-0062 include unauthorized access to sensitive configurations and administrative privileges on the affected Cisco devices.