First published: Thu Apr 18 2019(Updated: )
A vulnerability in the CLI of Cisco Aironet Series Access Points (APs) could allow an authenticated, local attacker to gain access to the underlying Linux operating system (OS) without the proper authentication. The attacker would need valid administrator device credentials. The vulnerability is due to improper validation of user-supplied input for certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input for a CLI command. A successful exploit could allow the attacker to obtain access to the underlying Linux OS without proper authentication.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Aironet Access Point Firmware | <8.3.150.0 | |
Cisco Aironet Access Point Firmware | >=8.5<8.5.140.0 | |
Cisco Aironet Access Point Firmware | >=8.6.101.0<8.8.111.0 | |
Cisco Aironet 1542d | ||
Cisco Aironet 1542i | ||
Cisco Aironet 1562d | ||
Cisco Aironet 1562e | ||
Cisco Aironet 1562i | ||
Cisco Aironet 1800i | ||
Cisco Aironet 2800e | ||
Cisco Aironet 2800i | ||
Cisco Aironet 3800e | ||
Cisco Aironet 3800i | ||
Cisco Aironet 3800p | ||
Cisco Aironet Access Point Firmware | =8.5\(131.0\) | |
Cisco Aironet 1850e | ||
Cisco Aironet 1850i | ||
All of | ||
Any of | ||
Cisco Aironet Access Point Firmware | <8.3.150.0 | |
Cisco Aironet Access Point Firmware | >=8.5<8.5.140.0 | |
Cisco Aironet Access Point Firmware | >=8.6.101.0<8.8.111.0 | |
Any of | ||
Cisco Aironet 1542d | ||
Cisco Aironet 1542i | ||
Cisco Aironet 1562d | ||
Cisco Aironet 1562e | ||
Cisco Aironet 1562i | ||
Cisco Aironet 1800i | ||
Cisco Aironet 2800e | ||
Cisco Aironet 2800i | ||
Cisco Aironet 3800e | ||
Cisco Aironet 3800i | ||
Cisco Aironet 3800p | ||
All of | ||
Cisco Aironet Access Point Firmware | =8.5\(131.0\) | |
Any of | ||
Cisco Aironet 1850e | ||
Cisco Aironet 1850i |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1829 is a vulnerability in the CLI of Cisco Aironet Series Access Points that allows an authenticated local attacker to gain access to the underlying Linux operating system without proper authentication.
CVE-2019-1829 affects Cisco Aironet Series Access Points by allowing an authenticated local attacker to gain access to the underlying Linux operating system without proper authentication.
CVE-2019-1829 has a severity rating of 6.7 (high).
To fix the vulnerability CVE-2019-1829, update the affected Cisco Aironet Series Access Points firmware to a version that is not vulnerable.
You can find more information about CVE-2019-1829 on the Cisco Security Advisory page and the SecurityFocus website.