Lucene search

K
cveCiscoCVE-2019-1835
HistoryApr 18, 2019 - 2:29 a.m.

CVE-2019-1835

2019-04-1802:29:05
CWE-22
cisco
web.nvd.nist.gov
28
cve-2019-1835
cisco aironet
access points
cli
vulnerability
sensitive information
directory traversal
nvd

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

AI Score

4.5

Confidence

High

EPSS

0

Percentile

9.9%

A vulnerability in the CLI of Cisco Aironet Access Points (APs) could allow an authenticated, local attacker to access sensitive information stored in an AP. The vulnerability is due to improper sanitization of user-supplied input in specific CLI commands. An attacker could exploit this vulnerability by accessing the CLI of an affected AP with administrator privileges and issuing crafted commands that result in directory traversal. A successful exploit could allow the attacker to view system files on the affected device, which could contain sensitive information. Software versions 8.8 and 8.9 are affected.

Affected configurations

Nvd
Vulners
Node
ciscoaironet_access_point_firmwareMatch8.8
OR
ciscoaironet_access_point_firmwareMatch8.9
AND
ciscoaironet_1542dMatch-
OR
ciscoaironet_1542iMatch-
OR
ciscoaironet_1562dMatch-
OR
ciscoaironet_1562eMatch-
OR
ciscoaironet_1562iMatch-
OR
ciscoaironet_1800iMatch-
OR
ciscoaironet_1850eMatch-
OR
ciscoaironet_1850iMatch-
OR
ciscoaironet_2800eMatch-
OR
ciscoaironet_2800iMatch-
OR
ciscoaironet_3800eMatch-
OR
ciscoaironet_3800iMatch-
OR
ciscoaironet_3800pMatch-
VendorProductVersionCPE
ciscoaironet_access_point_firmware8.8cpe:2.3:o:cisco:aironet_access_point_firmware:8.8:*:*:*:*:*:*:*
ciscoaironet_access_point_firmware8.9cpe:2.3:o:cisco:aironet_access_point_firmware:8.9:*:*:*:*:*:*:*
ciscoaironet_1542d-cpe:2.3:h:cisco:aironet_1542d:-:*:*:*:*:*:*:*
ciscoaironet_1542i-cpe:2.3:h:cisco:aironet_1542i:-:*:*:*:*:*:*:*
ciscoaironet_1562d-cpe:2.3:h:cisco:aironet_1562d:-:*:*:*:*:*:*:*
ciscoaironet_1562e-cpe:2.3:h:cisco:aironet_1562e:-:*:*:*:*:*:*:*
ciscoaironet_1562i-cpe:2.3:h:cisco:aironet_1562i:-:*:*:*:*:*:*:*
ciscoaironet_1800i-cpe:2.3:h:cisco:aironet_1800i:-:*:*:*:*:*:*:*
ciscoaironet_1850e-cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*
ciscoaironet_1850i-cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 151

CNA Affected

[
  {
    "product": "Cisco Aironet Access Point Software",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "8.8"
      },
      {
        "status": "affected",
        "version": "8.9"
      }
    ]
  }
]

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

AI Score

4.5

Confidence

High

EPSS

0

Percentile

9.9%

Related for CVE-2019-1835