A vulnerability in login authentication management in Cisco Aironet 1800, 2800, and 3800 Series Access Point platforms could allow an authenticated, local attacker to gain unrestricted root access to the underlying Linux operating system. The root Linux shell is provided for advanced troubleshooting and should not be available to individual users, even those with root privileges. The attacker must have the root password to exploit this vulnerability. More Information: CSCvb13893. Known Affected Releases: 8.2(121.0) 8.3(102.0). Known Fixed Releases: 8.4(1.53) 8.4(1.52) 8.3(111.0) 8.3(104.23) 8.2(130.0) 8.2(124.1).
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/97468 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038187 | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-aironet | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2017-04-07 17:59
Updated : 2024-02-28 15:44
NVD link : CVE-2016-9196
Mitre link : CVE-2016-9196
CVE.ORG link : CVE-2016-9196
JSON object : View
Products Affected
cisco
- aironet_3800p
- aironet_access_point
- aironet_2800e
- aironet_3800i
- aironet_3800e
- aironet_1800
- aironet_2800i
CWE
CWE-264
Permissions, Privileges, and Access Controls