First published: Wed Oct 17 2018(Updated: )
A vulnerability in the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to view system information that under normal circumstances should be prohibited. The vulnerability is due to incomplete input and validation checking mechanisms in the web-based interface URL request. An attacker could exploit this vulnerability by requesting specific URLs via the web-based interface. A successful exploit could allow the attacker to view sensitive system information. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-wlc-id
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controllers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20181017-wlc-id is classified as medium.
To fix cisco-sa-20181017-wlc-id, update your Cisco Wireless LAN Controller Software to the latest version provided by Cisco.
Users of Cisco Wireless LAN Controller Software are affected by cisco-sa-20181017-wlc-id.
An unauthenticated remote attacker can exploit cisco-sa-20181017-wlc-id to view system information.
cisco-sa-20181017-wlc-id was disclosed on October 17, 2018.