Vulnslist

find the latest Cisco vulnerabilities

Cisco Wireless LAN Controller Command Injection Vulnerability

Cisco-SA-20150625-CVE-2015-4224 · Medium · Published · Updated

A vulnerability in the command-line interface (CLI) processor of the Cisco Wireless LAN Controller (WLC) could allow an authenticated, local attacker to inject arbitrary commands that are executed with elevated privileges on the underlying operating system. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted commands through the CLI. An exploit could allow the attacker to read, write, and overwrite any file on the system or execute arbitrary code. Cisco has confirmed the vulnerability and released software updates. To exploit this vulnerability, an attacker must authenticate and have local access to the targeted device. These access requirements could reduce the likelihood of a successful exploit.

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to access local systems.

Administrators are advised to allow only privileged users to access administration or management systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2015-4224
Cisco Bug IDsCSCuj39474
CVSS ScoreBase 6.8
Base 6.8 AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C
Product Names From Source
Cisco Wireless LAN Controller (WLC) 7.0.240.0, Cisco Wireless LAN Controller (WLC)

Related Products

Product CVE Evidence
Cisco Wireless LAN Controller (WLC) CVE-2015-4224 Cisco OpenVuln