Lucene search

K
cvelistCiscoCVELIST:CVE-2024-20336
HistoryMar 06, 2024 - 4:31 p.m.

CVE-2024-20336

2024-03-0616:31:10
cisco
www.cve.org
cisco small business
buffer overflow
remote attackers
arbitrary code
http requests
root user
authentication

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

0.0004 Low

EPSS

Percentile

9.1%

A vulnerability in the web-based user interface of Cisco Small Business 100, 300, and 500 Series Wireless APs could allow an authenticated, remote attacker to perform buffer overflow attacks against an affected device. In order to exploit this vulnerability, the attacker must have valid administrative credentials for the device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.

CNA Affected

[
  {
    "vendor": "Cisco",
    "product": "Cisco Business Wireless Access Point Software",
    "versions": [
      {
        "version": "1.0.0.3",
        "status": "affected"
      },
      {
        "version": "1.0.0.4",
        "status": "affected"
      },
      {
        "version": "1.0.0.5",
        "status": "affected"
      },
      {
        "version": "1.0.0.7",
        "status": "affected"
      },
      {
        "version": "1.0.1.3",
        "status": "affected"
      },
      {
        "version": "1.0.1.5",
        "status": "affected"
      },
      {
        "version": "1.0.1.7",
        "status": "affected"
      },
      {
        "version": "1.0.2.0",
        "status": "affected"
      },
      {
        "version": "1.0.3.1",
        "status": "affected"
      },
      {
        "version": "1.0.4.4",
        "status": "affected"
      },
      {
        "version": "1.0.4.3",
        "status": "affected"
      },
      {
        "version": "1.0.5.0",
        "status": "affected"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

0.0004 Low

EPSS

Percentile

9.1%

Related for CVELIST:CVE-2024-20336