CVE-2014-0703

Cisco Wireless LAN Controller (WLC) devices 7.4 before 7.4.110.0 distribute Aironet IOS software with a race condition in the status of the administrative HTTP server, which allows remote attackers to bypass intended access restrictions by connecting to an Aironet access point on which this server had been disabled ineffectively, aka Bug ID CSCuf66202.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.100.0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.100.60:*:*:*:*:*:*:*
cpe:2.3:h:cisco:wireless_lan_controller:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:02

Type Values Removed Values Added
References () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-wlc - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-wlc - Vendor Advisory

Information

Published : 2014-03-06 11:55

Updated : 2024-11-21 02:02


NVD link : CVE-2014-0703

Mitre link : CVE-2014-0703

CVE.ORG link : CVE-2014-0703


JSON object : View

Products Affected

cisco

  • wireless_lan_controller
  • wireless_lan_controller_software
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')