Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco IOS XE Software for Wireless LAN Controllers Privilege Escalation Vulnerability

cisco-sa-iosxe-wlc-privesc-RjSMrmPK · Medium · Published · Updated

A vulnerability in the CLI of Cisco IOS XE Software could allow an authenticated, low-privileged, local attacker to access WLAN configuration details including passwords. This vulnerability is due to improper privilege checks. An attacker could exploit this vulnerability by using the show and show tech wireless CLI commands to access configuration details, including passwords. A successful exploit could allow the attacker to access configuration details that they are not authorized to access. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-wlc-privesc-RjSMrmPK This advisory is part of the March 2024 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.

Cisco advisory · CSAF JSON

Workarounds

There are no workarounds that address this vulnerability.

However, if a preshared key (PSK) is being used and password encryption is not enabled, the WLAN PSK can be exposed to unauthorized users. To prevent exposure of the WLAN PSK to unauthorized users, enable password encryption. However, other configuration details may still be accessible to unauthorized users.

While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2024-20324
Cisco Bug IDsCSCwf36190
CVSS ScoreBase 5.5
Base 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:X/RL:X/RC:X
Product Names From Source
Cisco IOS XE Software 16.10.1, Cisco IOS XE Software 16.10.1s, Cisco IOS XE Software 16.10.1e, Cisco IOS XE Software 16.11.1, Cisco IOS XE Software 16.11.1a, Cisco IOS XE Software 16.11.1b, Cisco IOS XE Software 16.11.1c, Cisco IOS XE Software 16.12.1, Cisco IOS XE Software 16.12.1s, Cisco IOS XE Software 16.12.3, Cisco IOS XE Software 16.12.8, Cisco IOS XE Software 16.12.2s, Cisco IOS XE Software 16.12.1t, Cisco IOS XE Software 16.12.2t, Cisco IOS XE Software 16.12.4, Cisco IOS XE Software 16.12.3s, Cisco IOS XE Software 16.12.4a, Cisco IOS XE Software 16.12.5, Cisco IOS XE Software 16.12.6, Cisco IOS XE Software 16.12.6a, Cisco IOS XE Software 16.12.7, Cisco IOS XE Software 17.1.1, Cisco IOS XE Software 17.1.1s, Cisco IOS XE Software 17.1.2, Cisco IOS XE Software 17.1.1t, Cisco IOS XE Software 17.1.3, Cisco IOS XE Software 17.2.1, Cisco IOS XE Software 17.2.1a, Cisco IOS XE Software 17.3.1, Cisco IOS XE Software 17.3.2, Cisco IOS XE Software 17.3.3, Cisco IOS XE Software 17.3.2a, Cisco IOS XE Software 17.3.4, Cisco IOS XE Software 17.3.5, Cisco IOS XE Software 17.3.6, Cisco IOS XE Software 17.3.4c, Cisco IOS XE Software 17.3.5a, Cisco IOS XE Software 17.3.5b, Cisco IOS XE Software 17.3.7, Cisco IOS XE Software 17.3.8, Cisco IOS XE Software 17.3.8a, Cisco IOS XE Software 17.4.1, Cisco IOS XE Software 17.5.1, Cisco IOS XE Software 17.5.1b, Cisco IOS XE Software 17.5.1c, Cisco IOS XE Software 17.6.1, Cisco IOS XE Software 17.6.2, Cisco IOS XE Software 17.6.3, Cisco IOS XE Software 17.6.1y, Cisco IOS XE Software 17.6.4, Cisco IOS XE Software 17.6.5, Cisco IOS XE Software 17.6.6, Cisco IOS XE Software 17.6.6a, Cisco IOS XE Software 17.6.5a, Cisco IOS XE Software 17.7.1, Cisco IOS XE Software 17.10.1, Cisco IOS XE Software 17.8.1, Cisco IOS XE Software 17.9.1, Cisco IOS XE Software 17.9.2, Cisco IOS XE Software 17.9.3, Cisco IOS XE Software 17.9.4, Cisco IOS XE Software 17.9.4a, Cisco IOS XE Software 17.11.1, Cisco IOS XE Software 17.12.1, Cisco IOS, Cisco IOS XE Software

Related Products

Product CVE Evidence
Cisco IOS CVE-2024-20324 Cisco OpenVuln
Cisco IOS XE Software CVE-2024-20324 Cisco OpenVuln
Cisco Catalyst 9600 Series Switches CVE-2024-20324 Cisco OpenVuln · software-dependent
Cisco Catalyst 9500 Series Switches CVE-2024-20324 Cisco OpenVuln · software-dependent
Cisco Catalyst 9400 Series Switches CVE-2024-20324 Cisco OpenVuln · software-dependent
Cisco Catalyst 9200 Series Switches CVE-2024-20324 Cisco OpenVuln · software-dependent
Cisco Catalyst 9300 Series Switches CVE-2024-20324 Cisco OpenVuln · software-dependent