Lucene search

K
vulnrichmentCiscoVULNRICHMENT:CVE-2024-20335
HistoryMar 06, 2024 - 4:30 p.m.

CVE-2024-20335

2024-03-0616:30:39
cisco
github.com
3
cisco
wireless aps
command injection

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A vulnerability in the web-based management interface of Cisco Small Business 100, 300, and 500 Series Wireless APs could allow an authenticated, remote attacker to perform command injection attacks against an affected device. In order to exploit this vulnerability, the attacker must have valid administrative credentials for the device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.10:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.12:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.13:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.14:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.15:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.16:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.17:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.4:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.5:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.7:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.9:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.10:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.11:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.12:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.2:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.5:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.6:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.7:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.9:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.2.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.2.6:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.3.1:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.4.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.4.4:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.5.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.0.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.0.4:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.0.5:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.0.6:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.0.7:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.0.9:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.1.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.2.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.2.4:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.3.2:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.4.0:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.4.6:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.2.0.2:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.2.0.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.2.1.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.3.0.3:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.3.0.4:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.3.0.6:*:*:*:*:*:*:*",
      "cpe:2.3:a:cisco:business_wireless_access_point_software:1.3.0.7:*:*:*:*:*:*:*"
    ],
    "vendor": "cisco",
    "product": "business_wireless_access_point_software",
    "versions": [
      {
        "status": "affected",
        "version": "1.0.0.10"
      },
      {
        "status": "affected",
        "version": "1.0.0.12"
      },
      {
        "status": "affected",
        "version": "1.0.0.13"
      },
      {
        "status": "affected",
        "version": "1.0.0.14"
      },
      {
        "status": "affected",
        "version": "1.0.0.15"
      },
      {
        "status": "affected",
        "version": "1.0.0.16"
      },
      {
        "status": "affected",
        "version": "1.0.0.17"
      },
      {
        "status": "affected",
        "version": "1.0.0.3"
      },
      {
        "status": "affected",
        "version": "1.0.0.4"
      },
      {
        "status": "affected",
        "version": "1.0.0.5"
      },
      {
        "status": "affected",
        "version": "1.0.0.7"
      },
      {
        "status": "affected",
        "version": "1.0.0.9"
      },
      {
        "status": "affected",
        "version": "1.0.1.10"
      },
      {
        "status": "affected",
        "version": "1.0.1.11"
      },
      {
        "status": "affected",
        "version": "1.0.1.12"
      },
      {
        "status": "affected",
        "version": "1.0.1.2"
      },
      {
        "status": "affected",
        "version": "1.0.1.3"
      },
      {
        "status": "affected",
        "version": "1.0.1.5"
      },
      {
        "status": "affected",
        "version": "1.0.1.6"
      },
      {
        "status": "affected",
        "version": "1.0.1.7"
      },
      {
        "status": "affected",
        "version": "1.0.1.9"
      },
      {
        "status": "affected",
        "version": "1.0.2.0"
      },
      {
        "status": "affected",
        "version": "1.0.2.6"
      },
      {
        "status": "affected",
        "version": "1.0.3.1"
      },
      {
        "status": "affected",
        "version": "1.0.4.3"
      },
      {
        "status": "affected",
        "version": "1.0.4.4"
      },
      {
        "status": "affected",
        "version": "1.0.5.0"
      },
      {
        "status": "affected",
        "version": "1.1.0.3"
      },
      {
        "status": "affected",
        "version": "1.1.0.4"
      },
      {
        "status": "affected",
        "version": "1.1.0.5"
      },
      {
        "status": "affected",
        "version": "1.1.0.6"
      },
      {
        "status": "affected",
        "version": "1.1.0.7"
      },
      {
        "status": "affected",
        "version": "1.1.0.9"
      },
      {
        "status": "affected",
        "version": "1.1.1.0"
      },
      {
        "status": "affected",
        "version": "1.1.2.3"
      },
      {
        "status": "affected",
        "version": "1.1.2.4"
      },
      {
        "status": "affected",
        "version": "1.1.3.2"
      },
      {
        "status": "affected",
        "version": "1.1.4.0"
      },
      {
        "status": "affected",
        "version": "1.1.4.6"
      },
      {
        "status": "affected",
        "version": "1.2.0.2"
      },
      {
        "status": "affected",
        "version": "1.2.0.3"
      },
      {
        "status": "affected",
        "version": "1.2.1.3"
      },
      {
        "status": "affected",
        "version": "1.3.0.3"
      },
      {
        "status": "affected",
        "version": "1.3.0.4"
      },
      {
        "status": "affected",
        "version": "1.3.0.6"
      },
      {
        "status": "affected",
        "version": "1.3.0.7"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-20335