First published: Wed Oct 17 2018(Updated: )
A vulnerability in the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to view system information that under normal circumstances should be prohibited. The vulnerability is due to incomplete input and validation checking mechanisms in the web-based interface URL request. An attacker could exploit this vulnerability by requesting specific URLs via the web-based interface. A successful exploit could allow the attacker to view sensitive system information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controller Software | =8.5\(130.0\) | |
Cisco Wireless LAN Controller Software | =8.9\(1.52\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0416 is a vulnerability in the web-based interface of Cisco Wireless LAN Controller (WLC) Software that allows an unauthenticated attacker to view system information.
The severity of CVE-2018-0416 is medium with a CVSS score of 5.3.
An unauthenticated attacker can exploit CVE-2018-0416 by accessing the web-based interface of the affected software.
Versions 8.5(130.0) and 8.9(1.52) of Cisco Wireless LAN Controller Software are affected by CVE-2018-0416.
Yes, Cisco has released a security advisory with fixes for CVE-2018-0416.