what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

Cisco Security Advisory 20170315-ap1800

Cisco Security Advisory 20170315-ap1800
Posted Mar 16, 2017
Authored by Cisco Systems | Site cisco.com

Cisco Security Advisory - A vulnerability in the web-based GUI of Cisco Mobility Express 1800 Series Access Points could allow an unauthenticated, remote attacker to bypass authentication. The attacker could be granted full administrator privileges. The vulnerability is due to improper implementation of authentication for accessing certain web pages using the GUI interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface of the affected system. A successful exploit could allow the attacker to bypass authentication and perform unauthorized configuration changes or issue control commands to the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

tags | advisory, remote, web
systems | cisco
advisories | CVE-2017-3831
SHA-256 | bd92cac44b2f149009706c1808ced146e1c0f4fc15a1754d8a0e09ca477ef530

Cisco Security Advisory 20170315-ap1800

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Cisco Security Advisory: Cisco Mobility Express 1800 Access Point Series Authentication Bypass Vulnerability

Advisory ID: cisco-sa-20170315-ap1800

Revision: 1.0

For Public Release: 2017 March 15 16:00 GMT

Last Updated: 2017 March 15 16:00 GMT

CVE ID(s): CVE-2017-3831

CVSS Score v(3): 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

+---------------------------------------------------------------------

Summary
=======
A vulnerability in the web-based GUI of Cisco Mobility Express 1800 Series Access Points could allow an unauthenticated, remote attacker to bypass authentication. The attacker could be granted full administrator privileges.

The vulnerability is due to improper implementation of authentication for accessing certain web pages using the GUI interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface of the affected system. A successful exploit could allow the attacker to bypass authentication and perform unauthorized configuration changes or issue control commands to the affected device.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800 ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-ap1800"]

-----BEGIN PGP SIGNATURE-----
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=Xeal
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close