A vulnerability in the web-based GUI of Cisco Mobility Express 1800 Series Access Points could allow an unauthenticated, remote attacker to bypass authentication. The attacker could be granted full administrator privileges. The vulnerability is due to improper implementation of authentication for accessing certain web pages using the GUI interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface of the affected system. A successful exploit could allow the attacker to bypass authentication and perform unauthorized configuration changes or issue control commands to the affected device. This vulnerability affects Cisco Mobility Express 1800 Series Access Points running a software version prior to 8.2.110.0. Cisco Bug IDs: CSCuy68219.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/96909 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2017-03-15 20:59
Updated : 2024-02-28 15:44
NVD link : CVE-2017-3831
Mitre link : CVE-2017-3831
CVE.ORG link : CVE-2017-3831
JSON object : View
Products Affected
cisco
- aironet_1830i
- aironet_1830e
- aironet_1815i
- aironet_access_point_software
- aironet_1810
- aironet_1810w
- aironet_1850i
- aironet_1850e