Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2021-01812

Опубликовано: 24 мар. 2021
Источник: fstec
CVSS3: 6.7
CVSS2: 6.8
EPSS Низкий

Описание

Уязвимость микропрограммного обеспечения точек доступа Cisco Aironet Access Points связана с недостатками контроля доступа. Эксплуатация уязвимости может позволить нарушителю выполнить произвольный код во время загрузки

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco Aironet 1540
Cisco Aironet 1560
Cisco Aironet 1800
Cisco Aironet 2800
Cisco Aironet 3800
Cisco Aironet 4800
Catalyst 9100
Catalyst IW 6300

Версия ПО

- (Cisco Aironet 1540)
- (Cisco Aironet 1560)
- (Cisco Aironet 1800)
- (Cisco Aironet 2800)
- (Cisco Aironet 3800)
- (Cisco Aironet 4800)
- (Catalyst 9100)
- (Catalyst IW 6300)

Тип ПО

ПО сетевого программно-аппаратного средства
Микропрограммный код

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,8)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 6,7)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-privesc-wEVfp8Ud

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 14%
0.00045
Низкий

6.7 Medium

CVSS3

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.7
nvd
почти 5 лет назад

A vulnerability in the boot logic of Cisco Access Points Software could allow an authenticated, local attacker to execute unsigned code at boot time. The vulnerability is due to an improper check that is performed by the area of code that manages system startup processes. An attacker could exploit this vulnerability by modifying a specific file that is stored on the system, which would allow the attacker to bypass existing protections. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device. Note: To exploit this vulnerability, the attacker would need to have access to the development shell (devshell) on the device.

CVSS3: 6.7
github
больше 3 лет назад

A vulnerability in the boot logic of Cisco Access Points Software could allow an authenticated, local attacker to execute unsigned code at boot time. The vulnerability is due to an improper check that is performed by the area of code that manages system startup processes. An attacker could exploit this vulnerability by modifying a specific file that is stored on the system, which would allow the attacker to bypass existing protections. A successful exploit could allow the attacker to execute unsigned code at boot time and bypass the software image verification check part of the secure boot process of an affected device. Note: To exploit this vulnerability, the attacker would need to have access to the development shell (devshell) on the device.

EPSS

Процентиль: 14%
0.00045
Низкий

6.7 Medium

CVSS3

6.8 Medium

CVSS2