Cisco Wireless LAN Controller (WLC) devices 7.4 before 7.4.110.0 distribute Aironet IOS software with a race condition in the status of the administrative HTTP server, which allows remote attackers to bypass intended access restrictions by connecting to an Aironet access point on which this server had been disabled ineffectively, aka Bug ID CSCuf66202.
References
Link | Resource |
---|---|
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-wlc | Vendor Advisory |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-wlc | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140305-wlc - Vendor Advisory |
Information
Published : 2014-03-06 11:55
Updated : 2024-11-21 02:02
NVD link : CVE-2014-0703
Mitre link : CVE-2014-0703
CVE.ORG link : CVE-2014-0703
JSON object : View
Products Affected
cisco
- wireless_lan_controller
- wireless_lan_controller_software
CWE
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')