Логотип exploitDog
bind:CVE-2019-1829
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-1829

Количество 3

Количество 3

nvd логотип

CVE-2019-1829

почти 7 лет назад

A vulnerability in the CLI of Cisco Aironet Series Access Points (APs) could allow an authenticated, local attacker to gain access to the underlying Linux operating system (OS) without the proper authentication. The attacker would need valid administrator device credentials. The vulnerability is due to improper validation of user-supplied input for certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input for a CLI command. A successful exploit could allow the attacker to obtain access to the underlying Linux OS without proper authentication.

CVSS3: 6.7
EPSS: Низкий
github логотип

GHSA-jmm4-f26g-5j4r

больше 3 лет назад

A vulnerability in the CLI of Cisco Aironet Series Access Points (APs) could allow an authenticated, local attacker to gain access to the underlying Linux operating system (OS) without the proper authentication. The attacker would need valid administrator device credentials. The vulnerability is due to improper validation of user-supplied input for certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input for a CLI command. A successful exploit could allow the attacker to obtain access to the underlying Linux OS without proper authentication.

CVSS3: 6.7
EPSS: Низкий
fstec логотип

BDU:2019-01683

почти 7 лет назад

Уязвимость интерфейса командной строки микропрограммного обеспечения точек доступа Cisco Aironet Access Points (AP) серий 1540, 1560, 1800, 2800, 3800, позволяющая нарушителю получить доступ к встроенной операционной системе

CVSS3: 6.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-1829

A vulnerability in the CLI of Cisco Aironet Series Access Points (APs) could allow an authenticated, local attacker to gain access to the underlying Linux operating system (OS) without the proper authentication. The attacker would need valid administrator device credentials. The vulnerability is due to improper validation of user-supplied input for certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input for a CLI command. A successful exploit could allow the attacker to obtain access to the underlying Linux OS without proper authentication.

CVSS3: 6.7
0%
Низкий
почти 7 лет назад
github логотип
GHSA-jmm4-f26g-5j4r

A vulnerability in the CLI of Cisco Aironet Series Access Points (APs) could allow an authenticated, local attacker to gain access to the underlying Linux operating system (OS) without the proper authentication. The attacker would need valid administrator device credentials. The vulnerability is due to improper validation of user-supplied input for certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input for a CLI command. A successful exploit could allow the attacker to obtain access to the underlying Linux OS without proper authentication.

CVSS3: 6.7
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-01683

Уязвимость интерфейса командной строки микропрограммного обеспечения точек доступа Cisco Aironet Access Points (AP) серий 1540, 1560, 1800, 2800, 3800, позволяющая нарушителю получить доступ к встроенной операционной системе

CVSS3: 6.7
0%
Низкий
почти 7 лет назад

Уязвимостей на страницу