Lucene search

K
vulnrichmentCiscoVULNRICHMENT:CVE-2024-20336
HistoryMar 06, 2024 - 4:31 p.m.

CVE-2024-20336

2024-03-0616:31:10
cisco
github.com
5
vulnerability
cisco
web-based interface
buffer overflow
authenticated
remote attacker
administrative credentials
insufficient validation
http request
remote code execution
root user

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

8.2

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

A vulnerability in the web-based user interface of Cisco Small Business 100, 300, and 500 Series Wireless APs could allow an authenticated, remote attacker to perform buffer overflow attacks against an affected device. In order to exploit this vulnerability, the attacker must have valid administrative credentials for the device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:a:cisco:business_access_points:*:*:*:*:*:*:*:*"
    ],
    "vendor": "cisco",
    "product": "business_access_points",
    "versions": [
      {
        "status": "affected",
        "version": "1.0.0.3"
      },
      {
        "status": "affected",
        "version": "1.0.0.4"
      },
      {
        "status": "affected",
        "version": "1.0.0.5"
      },
      {
        "status": "affected",
        "version": "1.0.0.7"
      },
      {
        "status": "affected",
        "version": "1.0.1.3"
      },
      {
        "status": "affected",
        "version": "1.0.1.5"
      },
      {
        "status": "affected",
        "version": "1.0.1.7"
      },
      {
        "status": "affected",
        "version": "1.0.2.0"
      },
      {
        "status": "affected",
        "version": "1.0.3.1"
      },
      {
        "status": "affected",
        "version": "1.0.4.3"
      },
      {
        "status": "affected",
        "version": "1.0.4.4"
      },
      {
        "status": "affected",
        "version": "1.0.5.0"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N

AI Score

8.2

Confidence

High

SSVC

Exploitation

none

Automatable

no

Technical Impact

total

Related for VULNRICHMENT:CVE-2024-20336