7.5
CWE
255
Advisory Published
Updated

CVE-2018-0226

First published: Wed May 02 2018(Updated: )

A vulnerability in the assignment and management of default user accounts for Secure Shell (SSH) access to Cisco Aironet 1800, 2800, and 3800 Series Access Points that are running Cisco Mobility Express Software could allow an authenticated, remote attacker to gain elevated privileges on an affected access point. The vulnerability exists because the Cisco Mobility Express controller of the affected software configures the default SSH user account for an access point to be the first SSH user account that was created for the Mobility Express controller, if an administrator added user accounts directly to the controller instead of using the default configuration or the SSH username creation wizard. Although the user account has read-only privileges for the Mobility Express controller, the account could have administrative privileges for an associated access point. An attacker who has valid user credentials for an affected controller could exploit this vulnerability by using the default SSH user account to authenticate to an affected access point via SSH. A successful exploit could allow the attacker to log in to the affected access point with administrative privileges and perform arbitrary administrative actions. This vulnerability affects the following Cisco products: Aironet 1800 Series Access Points that are running Cisco Mobility Express Software Releases 8.2.121.0 through 8.5.105.0, Aironet 2800 Series Access Points that are running Cisco Mobility Express Software Releases 8.3.102.0 through 8.5.105.0, Aironet 3800 Series Access Points that are running Cisco Mobility Express Software Releases 8.3.102.0 through 8.5.105.0. Cisco Bug IDs: CSCva68116.

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco Mobility Express=8.3\(90.65\)
Cisco Mobility Express=8.4\(1.65\)

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this vulnerability?

    The vulnerability ID for this vulnerability is CVE-2018-0226.

  • What is the severity of CVE-2018-0226?

    The severity of CVE-2018-0226 is high with a CVSS base score of 7.5.

  • Which software is affected by CVE-2018-0226?

    CVE-2018-0226 affects Cisco Aironet 1800, 2800, and 3800 Series Access Points running Cisco Mobility Express Software versions 8.3(90.65) and 8.4(1.65).

  • What can an authenticated, remote attacker do with CVE-2018-0226?

    An authenticated, remote attacker can gain elevated privileges on an affected device.

  • Where can I find more information about CVE-2018-0226?

    You can find more information about CVE-2018-0226 at the following references: [1] http://www.securityfocus.com/bid/104124 [2] http://www.securitytracker.com/id/1040817 [3] https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-aironet-ssh

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203