A vulnerability in the implementation of a CLI command in Cisco Aironet Access Points (AP) could allow an authenticated, local attacker to overwrite files in the flash memory of the device. This vulnerability is due to insufficient input validation for a specific command. An attacker could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to overwrite or create files with data that is already present in other files that are hosted on the affected device.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
History
21 Nov 2024, 05:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ap-foverwrt-HyVXvrtb - Vendor Advisory |
Information
Published : 2021-03-24 21:15
Updated : 2024-11-21 05:44
NVD link : CVE-2021-1423
Mitre link : CVE-2021-1423
CVE.ORG link : CVE-2021-1423
JSON object : View
Products Affected
cisco
- aironet_2800
- catalyst_9800_firmware
- aironet_1560
- aironet_1540
- aironet_access_point_software
- aironet_4800
- catalyst_iw6300
- 1100_integrated_services_router
- aironet_1800
- wireless_lan_controller_software
- aironet_3800
- catalyst_9100
- esw6300
- catalyst_9800
CWE
CWE-668
Exposure of Resource to Wrong Sphere