First published: Wed Oct 16 2019(Updated: )
A vulnerability in the CLI of Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, local attacker to view system files that should be restricted. This vulnerability is due to improper sanitization of user-supplied input in command-line parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files that may contain sensitive information.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controller Software | <8.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15266 is a vulnerability in the CLI of Cisco Wireless LAN Controller (WLC) Software that could allow an authenticated, local attacker to view system files that should be restricted.
CVE-2019-15266 occurs due to improper sanitization of user-supplied input in command-line parameters that describe filenames.
The severity of CVE-2019-15266 is medium (4.4).
An attacker can exploit CVE-2019-15266 by authenticating locally and using the CLI to access system files that are meant to be restricted.
To fix CVE-2019-15266, Cisco recommends updating to a fixed software release.