A vulnerability in the web-based management interface of Cisco Unified Industrial Wireless Software for Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points could allow an unauthenticated, remote attacker to perform command injection attacks with root privileges on the underlying operating system. This vulnerability is due to improper validation of input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system of the affected device.
History

Wed, 06 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Cisco
Cisco aironet Access Point Software
CPEs cpe:2.3:a:cisco:aironet_access_point_software:*:*:*:*:*:*:*:*
Vendors & Products Cisco
Cisco aironet Access Point Software
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 06 Nov 2024 17:15:00 +0000

Type Values Removed Values Added
Description A vulnerability in the web-based management interface of Cisco Unified Industrial Wireless Software for Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points could allow an unauthenticated, remote attacker to perform command injection attacks with root privileges on the underlying operating system. This vulnerability is due to improper validation of input to the web-based management interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system of the affected device.
Title Cisco Ultra-Reliable Wireless Backhaul Software Command Injection Vulnerability
Weaknesses CWE-77
References
Metrics cvssV3_1

{'score': 10, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2024-11-06T16:59:36.640Z

Updated: 2024-11-08T04:55:17.053Z

Reserved: 2023-11-08T15:08:07.663Z

Link: CVE-2024-20418

cve-icon Vulnrichment

Updated: 2024-11-06T17:31:35.002Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-11-06T17:15:14.453

Modified: 2024-11-06T18:17:17.287

Link: CVE-2024-20418

cve-icon Redhat

No data.