First published: Wed Apr 17 2019(Updated: )
A vulnerability in certain access control mechanisms for the Secure Shell (SSH) server implementation for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to access a CLI instance on an affected device. The vulnerability is due to a lack of proper input- and validation-checking mechanisms for inbound SSH connections on an affected device. An attacker could exploit this vulnerability by attempting to establish an SSH connection to an affected controller. An exploit could allow the attacker to access an affected device's CLI to potentially cause further attacks. This vulnerability has been fixed in version 8.5(140.0).
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controller Software | =8.3\(141.0\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2019-1805.
The severity of CVE-2019-1805 is medium with a severity value of 4.3.
The affected software for CVE-2019-1805 is Cisco Wireless LAN Controller Software version 8.3(141.0).
An unauthenticated, adjacent attacker can exploit CVE-2019-1805 to access a CLI instance on an affected device.
Yes, Cisco has provided a fix for CVE-2019-1805. Please refer to the Cisco Security Advisory for more information.