Vulnslist

find the latest Cisco vulnerabilities

Cisco Wireless LAN Controller Path Traversal Vulnerability

cisco-sa-20191016-wlc-pathtrav · Medium · Published · Updated

A vulnerability in the CLI of Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, local attacker to view system files that should be restricted. This vulnerability is due to improper sanitization of user-supplied input in command-line parameters that describe filenames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files that may contain sensitive information. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191016-wlc-pathtrav

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2019-15266
Cisco Bug IDsCSCvq59683
CVSS ScoreBase 4.4
Base 4.4 CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco Wireless LAN Controller (WLC)

Related Products

Product CVE Evidence
Cisco Nexus Dashboard CVE-2019-15266 Cisco OpenVuln
Cisco Application Centric Infrastructure Virtual Edge CVE-2019-15266 Cisco OpenVuln
Cisco Wireless LAN Controller (WLC) CVE-2019-15266 Cisco OpenVuln