A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Aironet 1540
Subscribe
Aironet 1542d
Subscribe
Aironet 1542i
Subscribe
Aironet 1560
Subscribe
Aironet 1562d
Subscribe
Aironet 1562e
Subscribe
Aironet 1562i
Subscribe
Aironet 1800
Subscribe
Aironet 1800i
Subscribe
Aironet 1810
Subscribe
Aironet 1810w
Subscribe
Aironet 1815
Subscribe
Aironet 1815i
Subscribe
Aironet 1815m
Subscribe
Aironet 1815t
Subscribe
Aironet 1815w
Subscribe
Aironet 2800
Subscribe
Aironet 2800e
Subscribe
Aironet 2800i
Subscribe
Aironet 3800
Subscribe
Aironet 3800e
Subscribe
Aironet 3800i
Subscribe
Aironet 3800p
Subscribe
Aironet 4800
Subscribe
Aironet Access Point Software
Subscribe
Catalyst 9100
Subscribe
Catalyst 9105
Subscribe
Catalyst 9105ax
Subscribe
Catalyst 9105axi
Subscribe
Catalyst 9105axw
Subscribe
Catalyst 9115
Subscribe
Catalyst 9115 Ap
Subscribe
Catalyst 9115ax
Subscribe
Catalyst 9115axe
Subscribe
Catalyst 9115axi
Subscribe
Catalyst 9117
Subscribe
Catalyst 9117 Ap
Subscribe
Catalyst 9117ax
Subscribe
Catalyst 9117axi
Subscribe
Catalyst 9120
Subscribe
Catalyst 9120 Ap
Subscribe
Catalyst 9120ax
Subscribe
Catalyst 9120axe
Subscribe
Catalyst 9120axi
Subscribe
Catalyst 9120axp
Subscribe
Catalyst 9124
Subscribe
Catalyst 9124ax
Subscribe
Catalyst 9124axd
Subscribe
Catalyst 9124axi
Subscribe
Catalyst 9130
Subscribe
Catalyst 9130 Ap
Subscribe
Catalyst 9130ax
Subscribe
Catalyst 9130axe
Subscribe
Catalyst 9130axi
Subscribe
Catalyst Iw6300
Subscribe
Catalyst Iw6300 Ac
Subscribe
Catalyst Iw6300 Dc
Subscribe
Catalyst Iw6300 Dcw
Subscribe
Esw6300
Subscribe
Ios Xe
Subscribe
Wireless Lan Controller Software
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-24276 | A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 25 Oct 2024 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-10-25T16:02:19.565Z
Reserved: 2022-10-27T00:00:00
Link: CVE-2023-20097
Updated: 2024-08-02T08:57:35.587Z
Status : Modified
Published: 2023-03-23T17:15:15.027
Modified: 2024-11-21T07:40:32.780
Link: CVE-2023-20097
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD