A vulnerability in the session identification management functionality of the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system. The vulnerability exists because the affected software does not properly clear previously assigned session identifiers for a user session when a user authenticates to the web-based interface. An attacker could exploit this vulnerability by using an existing session identifier to connect to the software through the web-based interface. Successful exploitation could allow the attacker to hijack an authenticated user's browser session on the system. Versions 8.1 and 8.5 are affected.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 20 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-19T19:11:56.991Z

Reserved: 2017-11-27T00:00:00

Link: CVE-2018-0382

cve-icon Vulnrichment

Updated: 2024-08-05T03:21:15.616Z

cve-icon NVD

Status : Modified

Published: 2019-04-17T22:29:00.280

Modified: 2024-11-21T03:38:06.693

Link: CVE-2018-0382

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.