First published: Wed Mar 24 2021(Updated: )
A vulnerability in the FlexConnect Upgrade feature of Cisco Aironet Series Access Points Software could allow an unauthenticated, remote attacker to obtain confidential information from an affected device. This vulnerability is due to an unrestricted Trivial File Transfer Protocol (TFTP) configuration. An attacker could exploit this vulnerability by sending a specific TFTP request to an affected device. A successful exploit could allow the attacker to download any file from the filesystem of the affected access point (AP). Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironet-info-disc-BfWqghj
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Wireless LAN Controller Software | =8.10.112.0 and later<8.10.142.0 | 8.10.142.0 |
Cisco Catalyst 9800 Wireless Controller Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is cisco-sa-aironet-info-disc-BfWqghj.
The severity rating of cisco-sa-aironet-info-disc-BfWqghj is 7.5, which is considered high.
An attacker can exploit cisco-sa-aironet-info-disc-BfWqghj by using an unrestricted TFTP configuration in the FlexConnect Upgrade feature of Cisco Aironet Series Access Points Software to obtain confidential information from an affected device.
The affected software versions are Cisco Wireless LAN Controller Software 8.10.112.0 and later (up to exclusive 8.10.142.0) and Cisco Catalyst 9800 Wireless Controller Software.
Yes, there is a remedy available for cisco-sa-aironet-info-disc-BfWqghj. For Cisco Wireless LAN Controller Software, apply version 8.10.142.0 or later. No specific remedy information is provided for Cisco Catalyst 9800 Wireless Controller Software.