IQ Engine before 10.6r1 on Extreme Network AP devices has a Buffer Overflow in the implementation of the CAPWAP protocol that may be exploited to obtain elevated privileges to conduct remote code execution. Access to the internal management interface/subnet is required to conduct the exploit.
References
Link | Resource |
---|---|
https://extremeportal.force.com/ExtrArticleDetail?an=000112741 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
26 Jul 2023, 21:39
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://extremeportal.force.com/ExtrArticleDetail?an=000112741 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
CWE | CWE-120 | |
CPE | cpe:2.3:h:extremenetworks:ap305c:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap650x:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap5050u:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap460c:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap510c:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap550:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap1130:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap305cx:-:*:*:*:*:*:*:* cpe:2.3:o:extremenetworks:iq_engine:*:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap130:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap305c-1:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap650:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap3000x:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap510cx:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap30:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap150w:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap5010:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap460s12c:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap630:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap4000-1:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap410c-1:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap3000:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap302w:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap460s6c:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap122:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap250:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap410c:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap4000:-:*:*:*:*:*:*:* cpe:2.3:h:extremenetworks:ap5050d:-:*:*:*:*:*:*:* |
|
First Time |
Extremenetworks ap410c
Extremenetworks ap3000 Extremenetworks ap150w Extremenetworks ap130 Extremenetworks iq Engine Extremenetworks ap250 Extremenetworks ap410c-1 Extremenetworks ap5010 Extremenetworks ap1130 Extremenetworks ap550 Extremenetworks ap650x Extremenetworks ap3000x Extremenetworks ap4000 Extremenetworks ap460s12c Extremenetworks ap305c Extremenetworks ap460s6c Extremenetworks ap305c-1 Extremenetworks ap305cx Extremenetworks ap122 Extremenetworks ap5050u Extremenetworks ap650 Extremenetworks ap5050d Extremenetworks ap460c Extremenetworks Extremenetworks ap630 Extremenetworks ap510c Extremenetworks ap510cx Extremenetworks ap4000-1 Extremenetworks ap302w Extremenetworks ap30 |
15 Jul 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-07-15 02:15
Updated : 2024-02-28 20:33
NVD link : CVE-2023-35802
Mitre link : CVE-2023-35802
CVE.ORG link : CVE-2023-35802
JSON object : View
Products Affected
extremenetworks
- ap250
- ap122
- ap3000x
- ap4000-1
- ap5050d
- ap650
- ap1130
- ap510c
- ap150w
- ap30
- ap550
- ap460c
- ap4000
- ap305cx
- ap5050u
- ap510cx
- ap305c
- ap460s12c
- ap460s6c
- ap5010
- ap630
- ap650x
- ap130
- ap410c-1
- ap305c-1
- ap410c
- iq_engine
- ap302w
- ap3000
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')