Логотип exploitDog
bind:CVE-2019-1805
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1805

Количество 3

Количество 3

nvd логотип

CVE-2019-1805

почти 7 лет назад

A vulnerability in certain access control mechanisms for the Secure Shell (SSH) server implementation for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to access a CLI instance on an affected device. The vulnerability is due to a lack of proper input- and validation-checking mechanisms for inbound SSH connections on an affected device. An attacker could exploit this vulnerability by attempting to establish an SSH connection to an affected controller. An exploit could allow the attacker to access an affected device's CLI to potentially cause further attacks. This vulnerability has been fixed in version 8.5(140.0).

CVSS3: 4.3
EPSS: Низкий
github логотип

GHSA-mcf3-mmrq-wrhp

больше 3 лет назад

A vulnerability in certain access control mechanisms for the Secure Shell (SSH) server implementation for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to access a CLI instance on an affected device. The vulnerability is due to a lack of proper input- and validation-checking mechanisms for inbound SSH connections on an affected device. An attacker could exploit this vulnerability by attempting to establish an SSH connection to an affected controller. An exploit could allow the attacker to access an affected device's CLI to potentially cause further attacks. This vulnerability has been fixed in version 8.5(140.0).

CVSS3: 4.3
EPSS: Низкий
fstec логотип

BDU:2019-01890

почти 7 лет назад

Уязвимость реализации сетевого протокола Secure Shell (SSH) микропрограммного обеспечения контроллеров беспроводного доступа Cisco Wireless LAN Controller, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 4.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1805

A vulnerability in certain access control mechanisms for the Secure Shell (SSH) server implementation for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to access a CLI instance on an affected device. The vulnerability is due to a lack of proper input- and validation-checking mechanisms for inbound SSH connections on an affected device. An attacker could exploit this vulnerability by attempting to establish an SSH connection to an affected controller. An exploit could allow the attacker to access an affected device's CLI to potentially cause further attacks. This vulnerability has been fixed in version 8.5(140.0).

CVSS3: 4.3
0%
Низкий
почти 7 лет назад
github логотип
GHSA-mcf3-mmrq-wrhp

A vulnerability in certain access control mechanisms for the Secure Shell (SSH) server implementation for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to access a CLI instance on an affected device. The vulnerability is due to a lack of proper input- and validation-checking mechanisms for inbound SSH connections on an affected device. An attacker could exploit this vulnerability by attempting to establish an SSH connection to an affected controller. An exploit could allow the attacker to access an affected device's CLI to potentially cause further attacks. This vulnerability has been fixed in version 8.5(140.0).

CVSS3: 4.3
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-01890

Уязвимость реализации сетевого протокола Secure Shell (SSH) микропрограммного обеспечения контроллеров беспроводного доступа Cisco Wireless LAN Controller, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

CVSS3: 4.3
0%
Низкий
почти 7 лет назад

Уязвимостей на страницу