First published: Thu Nov 08 2018(Updated: )
A vulnerability in the local status page functionality of the Cisco Meraki MR, MS, MX, Z1, and Z3 product lines could allow an authenticated, remote attacker to modify device configuration files. The vulnerability occurs when handling requests to the local status page. An exploit could allow the attacker to establish an interactive session to the device with elevated privileges. The attacker could then use the elevated privileges to further compromise the device or obtain additional configuration data from the device that is being exploited.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Meraki Mr 24 Firmware | <24.13 | |
Cisco Meraki Mr 25 Firmware | <25.11 | |
Cisco Meraki MR | ||
Cisco Meraki Ms 10 Firmware | <10.20 | |
Cisco Meraki Ms 9 Firmware | <9.37 | |
Cisco Meraki Ms | ||
Cisco Meraki Mx 13 Firmware | <13.32 | |
Cisco Meraki Mx 14 Firmware | <14.25 | |
Cisco Meraki Mx 15 Firmware | <15.7 | |
Cisco Meraki Mx | ||
Cisco Meraki Z1 | ||
Cisco Meraki Z3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2018-0284.
The severity of CVE-2018-0284 is medium with a severity value of 6.5.
The Cisco Meraki MR, MS, MX, Z1, and Z3 product lines are affected by CVE-2018-0284.
An attacker can exploit CVE-2018-0284 by modifying device configuration files through the local status page.
Yes, Cisco has released a security advisory with mitigation details for CVE-2018-0284. Please refer to the Cisco Security Advisory for more information.