First published: Wed Jun 08 2016(Updated: )
Cisco Aironet Access Point Software 8.2(100.0) on 1830e, 1830i, 1850e, 1850i, 2800, and 3800 access points allows local users to obtain Linux root access via crafted CLI command parameters, aka Bug ID CSCuy64037.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Aironet 1830E Firmware | ||
Cisco Aironet 1830i Access Point | ||
Cisco Aironet 1850e Access Point | ||
Cisco Aironet 1850i Access Point | ||
Cisco Aironet 2800 | ||
Cisco Aironet 3800p | ||
Cisco Access Point Software | =8.2_\(100.0\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1418 is a high-severity vulnerability that allows local users to gain root access on affected Cisco Access Points.
To fix CVE-2016-1418, upgrade the affected Cisco Access Point Software to a non-vulnerable version.
CVE-2016-1418 affects Cisco Aironet Access Point software version 8.2(100.0) on specific models including 1830e, 1830i, 1850e, 1850i, 2800, and 3800.
CVE-2016-1418 enables local users to execute crafted CLI command parameters to gain unauthorized Linux root access.
While there have been no confirmed reports of active exploitation, CVE-2016-1418 presents a risk due to its ability to provide root access.