First published: Wed Mar 15 2017(Updated: )
A vulnerability in the web-based GUI of Cisco Mobility Express 1800 Series Access Points could allow an unauthenticated, remote attacker to bypass authentication. The attacker could be granted full administrator privileges. The vulnerability is due to improper implementation of authentication for accessing certain web pages using the GUI interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface of the affected system. A successful exploit could allow the attacker to bypass authentication and perform unauthorized configuration changes or issue control commands to the affected device. This vulnerability affects Cisco Mobility Express 1800 Series Access Points running a software version prior to 8.2.110.0. Cisco Bug IDs: CSCuy68219.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Aironet Access Point Software | =8.1\(15.14\) | |
Cisco Aironet Access Point Software | =8.1\(112.3\) | |
Cisco Aironet Access Point Software | =8.1\(112.4\) | |
Cisco Aironet Access Point Software | =8.1\(131.0\) | |
Cisco Aironet 1810 | ||
Cisco Aironet 1810w | ||
Cisco Aironet 1815i | ||
Cisco Aironet 1830e | ||
Cisco Aironet 1830i | ||
Cisco Aironet 1850e | ||
Cisco Aironet 1850i |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.