First published: Wed May 02 2012(Updated: )
The TAC Case Attachment tool in Cisco Wireless Control System (WCS) 7.0 allows remote authenticated users to read arbitrary files under webnms/Temp/ via unspecified vectors, aka Bug ID CSCtq86807.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless Control System Software | =7.0.230.0 | |
Cisco Wireless Control System Software | =7.0.172.0 | |
Cisco Wireless Control System Software | =7.0.164.3 | |
Cisco Wireless Control System Software | =7.0.164.0 | |
Cisco Wireless Control System Software | =7.0.220.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4014 has a medium severity rating, indicating a moderate risk to affected systems.
To fix CVE-2011-4014, upgrade to a fixed version of Cisco Wireless Control System Software that addresses this vulnerability.
CVE-2011-4014 affects multiple versions of Cisco Wireless Control System Software, including 7.0.230.0, 7.0.172.0, 7.0.164.3, and 7.0.220.0.
CVE-2011-4014 can be exploited by remote authenticated users with access to the TAC Case Attachment tool.
Due to CVE-2011-4014, an attacker can read arbitrary files located in the webnms/Temp/ directory.