A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP.

Project Subscriptions

Vendors Products
Aironet 1540 Subscribe
Aironet 1542d Subscribe
Aironet 1542i Subscribe
Aironet 1560 Subscribe
Aironet 1562d Subscribe
Aironet 1562e Subscribe
Aironet 1562i Subscribe
Aironet 1800 Subscribe
Aironet 1800i Subscribe
Aironet 1810 Subscribe
Aironet 1810w Subscribe
Aironet 1815 Subscribe
Aironet 1815i Subscribe
Aironet 1815m Subscribe
Aironet 1815t Subscribe
Aironet 1815w Subscribe
Aironet 2800 Subscribe
Aironet 2800e Subscribe
Aironet 2800i Subscribe
Aironet 3800 Subscribe
Aironet 3800e Subscribe
Aironet 3800i Subscribe
Aironet 3800p Subscribe
Aironet 4800 Subscribe
Aironet Access Point Software Subscribe
Catalyst 9100 Subscribe
Catalyst 9105 Subscribe
Catalyst 9105ax Subscribe
Catalyst 9105axi Subscribe
Catalyst 9105axw Subscribe
Catalyst 9115 Subscribe
Catalyst 9115 Ap Subscribe
Catalyst 9115ax Subscribe
Catalyst 9115axe Subscribe
Catalyst 9115axi Subscribe
Catalyst 9117 Subscribe
Catalyst 9117 Ap Subscribe
Catalyst 9117ax Subscribe
Catalyst 9117axi Subscribe
Catalyst 9120 Subscribe
Catalyst 9120 Ap Subscribe
Catalyst 9120ax Subscribe
Catalyst 9120axe Subscribe
Catalyst 9120axi Subscribe
Catalyst 9120axp Subscribe
Catalyst 9124 Subscribe
Catalyst 9124ax Subscribe
Catalyst 9124axd Subscribe
Catalyst 9124axi Subscribe
Catalyst 9130 Subscribe
Catalyst 9130 Ap Subscribe
Catalyst 9130ax Subscribe
Catalyst 9130axe Subscribe
Catalyst 9130axi Subscribe
Catalyst Iw6300 Subscribe
Catalyst Iw6300 Ac Subscribe
Catalyst Iw6300 Dc Subscribe
Catalyst Iw6300 Dcw Subscribe
Esw6300 Subscribe
Wireless Lan Controller Software Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-24276 A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 25 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-10-25T16:02:19.565Z

Reserved: 2022-10-27T00:00:00

Link: CVE-2023-20097

cve-icon Vulnrichment

Updated: 2024-08-02T08:57:35.587Z

cve-icon NVD

Status : Modified

Published: 2023-03-23T17:15:15.027

Modified: 2024-11-21T07:40:32.780

Link: CVE-2023-20097

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses