First published: Thu Jan 24 2013(Updated: )
The HTTP Profiling functionality on Cisco Wireless LAN Controller (WLC) devices with software 7.3.101.0 allows remote authenticated users to execute arbitrary code via a crafted HTTP User-Agent header, aka Bug ID CSCuc15636.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco 2000 Wireless LAN Controller | ||
Cisco 2100 Wireless LAN Controller | ||
Cisco 2500 Wireless LAN Controller | ||
Cisco 4100 Wireless LAN Controller | ||
Cisco 4400 Wireless Lan Controller | ||
Cisco 5500 Wireless LAN Controller | ||
Cisco 7500 Wireless LAN Controller | ||
Cisco 8500 Wireless LAN Controller | ||
Cisco Wireless LAN Controller (WLC) Software | =7.3.101.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1104 is considered a high-severity vulnerability due to its potential to allow remote code execution.
To fix CVE-2013-1104, update the Cisco Wireless LAN Controller software to a version that addresses the vulnerability.
CVE-2013-1104 affects various models of Cisco Wireless LAN Controllers, including 2000, 2100, 2500, 4100, 4400, 5500, 7500, and 8500 series.
CVE-2013-1104 can be exploited by remote authenticated users through the manipulation of the HTTP User-Agent header.
The impact of CVE-2013-1104 includes the potential for executing arbitrary code, which could compromise the entire system.