Lucene search

K
ciscoCiscoCISCO-SA-20190417-WLAN-HIJACK
HistoryApr 17, 2019 - 4:00 p.m.

Cisco Wireless LAN Controller Software Session Hijacking Vulnerability

2019-04-1716:00:00
tools.cisco.com
26

EPSS

0.001

Percentile

51.1%

A vulnerability in the session identification management functionality of the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system.

The vulnerability exists because the affected software does not properly clear previously assigned session identifiers for a user session when a user authenticates to the web-based interface. An attacker could exploit this vulnerability by using an existing session identifier to connect to the software through the web-based interface. Successful exploitation could allow the attacker to hijack an authenticated user’s browser session on the system.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlan-hijack [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlan-hijack”]

Affected configurations

Vulners
Node
ciscowireless_lan_controllerMatchany
OR
ciscowireless_lan_controllerMatchany
VendorProductVersionCPE
ciscowireless_lan_controlleranycpe:2.3:h:cisco:wireless_lan_controller:any:*:*:*:*:*:*:*

EPSS

0.001

Percentile

51.1%

Related for CISCO-SA-20190417-WLAN-HIJACK