SB2019101611 - Multiple vulnerabilities in Cisco Wireless LAN Controller
Published: October 16, 2019 Updated: November 8, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Path traversal (CVE-ID: CVE-2019-15266)
The vulnerability allows a local user to perform directory traversal attacks.
The vulnerability exists due to improper sanitization of user-supplied input in command-line parameters that describe filenames. A local user can send a specially crafted HTTP request and read arbitrary files on the system.
2) Input validation error (CVE-ID: CVE-2019-15276)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists in the web interface due to a failure of the HTTP parsing engine to handle specially crafted URLs. A remote authenticated attacker can send a specially crafted URL to the web interface of the affected device and cause a denial of service condition on the target system.
Conversely, an unauthenticated attacker could exploit this vulnerability by persuading a user of the web interface to click the crafted URL.
Remediation
Install update from vendor's website.