Vulnslist

find the latest Cisco vulnerabilities

Cisco Aironet Access Points Command-Line Interpreter Linux Shell Command Injection Vulnerability

cisco-sa-20160606-aap · Medium · Published · Updated

A vulnerability in the command-line interpreter of Cisco Aironet 1800, 2800, and 3800 Series Access Points could allow an authenticated, local attacker to inject commands in the Linux shell. The commands could be executed with root-level privileges. The vulnerability is due to improper sanitization of user-supplied input for parameters of command-line interface (CLI) commands. An attacker could exploit this vulnerability by authenticating to the affected device and executing a subset of CLI commands with crafted input for those parameters. A successful exploit could allow the attacker to execute Linux shell commands with root-level privileges on the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160606-aap

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2016-1418
Cisco Bug IDsCSCuy64037
CVSS ScoreBase 6.8
Base 6.8 AV:L/AC:L/Au:S/C:C/I:C/A:C/E:F/RL:OF/RC:C
Product Names From Source
Cisco Aironet Access Point Software

Related Products

Product CVE Evidence
Cisco Nexus Dashboard CVE-2016-1418 Cisco OpenVuln
Cisco MDS 9000 Family of Multilayer Switches CVE-2016-1418 Cisco OpenVuln
Cisco Aironet Access Point Software CVE-2016-1418 Cisco OpenVuln