CVE-2019-1805

A vulnerability in certain access control mechanisms for the Secure Shell (SSH) server implementation for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to access a CLI instance on an affected device. The vulnerability is due to a lack of proper input- and validation-checking mechanisms for inbound SSH connections on an affected device. An attacker could exploit this vulnerability by attempting to establish an SSH connection to an affected controller. An exploit could allow the attacker to access an affected device's CLI to potentially cause further attacks. This vulnerability has been fixed in version 8.5(140.0).
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:wireless_lan_controller_software:8.3\(141.0\):*:*:*:*:*:*:*

History

21 Nov 2024, 04:37

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/108003 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/108003 - Third Party Advisory, VDB Entry
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlc-ssh - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlc-ssh - Vendor Advisory

Information

Published : 2019-04-18 01:29

Updated : 2024-11-21 04:37


NVD link : CVE-2019-1805

Mitre link : CVE-2019-1805

CVE.ORG link : CVE-2019-1805


JSON object : View

Products Affected

cisco

  • wireless_lan_controller_software
CWE
CWE-284

Improper Access Control

CWE-20

Improper Input Validation