First published: Fri Oct 22 2021(Updated: )
ANCOM WLAN Controller (Wireless Series & Hotspot) WLC-1000 & WLC-4006 was discovered to contain multiple cross-site scripting (XSS) vulnerabilities in the /authen/start/ module via the userid and password parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lancom Systems LCOS | =10.12-su14 | |
Lancom Systems LCOS | =10.20-su9 | |
Lancom Systems LCOS | =10.32-ru8 | |
Lancom Systems WLC-1000 | ||
Lancom Systems WLC-4006 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-23055 is classified as a medium severity vulnerability due to the potential for cross-site scripting attacks.
To fix CVE-2020-23055, ensure that your affected Lancom Systems LCOS version is updated to a secure version that addresses the XSS vulnerabilities.
CVE-2020-23055 affects Lancom Systems LCOS versions 10.12-su14, 10.20-su9, and 10.32-ru8.
CVE-2020-23055 is a cross-site scripting (XSS) vulnerability affecting the /authen/start/ module.
The userid and password parameters in the /authen/start/ module of the Lancom WLAN Controller are vulnerable in CVE-2020-23055.