Lucene search

K
symantecSymantec Security ResponseSMNTC-110538
HistoryOct 16, 2019 - 12:00 a.m.

Cisco Wireless LAN Controller Software CVE-2019-15266 Local Directory Traversal Vulnerability

2019-10-1600:00:00
Symantec Security Response
www.symantec.com
15

0.0004 Low

EPSS

Percentile

9.9%

Description

Cisco Wireless LAN Controller Software is prone to a local directory-traversal vulnerability. An attacker can exploit this issue using directory-traversal characters (‘…/’) to access or read arbitrary files that contain sensitive information or to access files outside of the restricted directory to obtain sensitive information and perform other attacks. This issue is being tracked by Cisco Bug ID CSCvq59683. Versions prior to Cisco Wireless LAN Controller (WLC) Software 8.10 are vulnerable.

Technologies Affected

  • Cisco Wireless Lan Controller Software 4.0
  • Cisco Wireless Lan Controller Software 4.1
  • Cisco Wireless Lan Controller Software 4.2
  • Cisco Wireless Lan Controller Software 5.0
  • Cisco Wireless Lan Controller Software 5.1
  • Cisco Wireless Lan Controller Software 5.2
  • Cisco Wireless Lan Controller Software 6.0
  • Cisco Wireless Lan Controller Software 7.3
  • Cisco Wireless Lan Controller Software 7.4
  • Cisco Wireless Lan Controller Software 7.5
  • Cisco Wireless Lan Controller Software 7.6
  • Cisco Wireless Lan Controller Software 8.0
  • Cisco Wireless Lan Controller Software 8.1
  • Cisco Wireless Lan Controller Software 8.2
  • Cisco Wireless Lan Controller Software 8.3
  • Cisco Wireless Lan Controller Software 8.4
  • Cisco Wireless Lan Controller Software 8.5
  • Cisco Wireless Lan Controller Software 8.6
  • Cisco Wireless Lan Controller Software 8.7
  • Cisco Wireless Lan Controller Software 8.8
  • Cisco Wireless Lan Controller Software 8.9

Recommendations

Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
To exploit this vulnerability, an attacker requires local interactive access to an affected computer. Grant local access for trusted and accountable users only.

Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, always run nonadministrative software as an unprivileged user with minimal access rights.

Updates are available. Please see the references or vendor advisory for more information.

References

0.0004 Low

EPSS

Percentile

9.9%

Related for SMNTC-110538