Improper access control in Cisco Systems, Inc products - CVE-2019-15260

 

Improper access control in Cisco Systems, Inc products - CVE-2019-15260

Published: November 8, 2019


Vulnerability identifier: #VU22599
CSH Severity: High
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber
CVE-ID: CVE-2019-15260
CWE-ID: CWE-284
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Aironet 1540 Series Access Points
Cisco Aironet 1560 Series Access Points
Cisco Aironet 1800 Series Access Points
Cisco Aironet 2800 Series Access Points
Cisco Aironet 3800 Series Access Points
Cisco 4800 Aironet Access Points

Detailed vulnerability description

The vulnerability allows a remote attacker to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions for certain URLs on an affected device. A remote attacker can request specific URLs from an affected AP and gain access to the target device with elevated privileges.

While the attackers would not be granted access to all possible configuration options, it could allow them to view sensitive information and replace some options with values of their choosing, including wireless network configuration. It would also allow perform a denial of service (DoS) attack on clients associated with the AP and disable the AP.


How to mitigate CVE-2019-15260

Install updates from vendor's website.

Sources