This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2017-04-06
Product Aironet Access Point Firmware Last view 2019-04-17
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:cisco:aironet_access_point_firmware:8.3_102.0:*:*:*:*:*:*:* 3
cpe:2.3:o:cisco:aironet_access_point_firmware:8.8:*:*:*:*:*:*:* 3
cpe:2.3:o:cisco:aironet_access_point_firmware:-:*:*:*:*:*:*:* 3
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2(100.0):*:*:*:*:*:*:* 3
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2(102.43):*:*:*:*:*:*:* 3
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2(102.139):*:*:*:*:*:*:* 3
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2(111.0):*:*:*:*:*:*:* 3
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2(121.12):*:*:*:*:*:*:* 3
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2(130.0):*:*:*:*:*:*:* 3
cpe:2.3:o:cisco:aironet_access_point_firmware:8.5(131.3):*:*:*:*:*:*:* 3
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2%28111.0%29:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2%28102.139%29:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2%28130.0%29:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2%28121.12%29:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2%28102.43%29:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2%28100.0%29:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.5%28131.0%29:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.9:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.5%28131.3%29:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.1.131.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2.110.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2.111.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2.121.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2.130.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2.141.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2.151.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2.160.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2.161.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2.164.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.2.166.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.3.102.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.3.111.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.3.112.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.3.121.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.3.122.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.3.130.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.3.131.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.3.132.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.3.133.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.3.140.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.3.141.0:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:*:*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:8.5(131.0):*:*:*:*:*:*:* 2
cpe:2.3:o:cisco:aironet_access_point_firmware:90.57:*:*:*:*:*:*:* 1
cpe:2.3:o:cisco:aironet_access_point_firmware:102.0:*:*:*:*:*:*:* 1

Related : CVE

  Date Alert Description
4.4 2019-04-17 CVE-2019-1835

A vulnerability in the CLI of Cisco Aironet Access Points (APs) could allow an authenticated, local attacker to access sensitive information stored in an AP. The vulnerability is due to improper sanitization of user-supplied input in specific CLI commands. An attacker could exploit this vulnerability by accessing the CLI of an affected AP with administrator privileges and issuing crafted commands that result in directory traversal. A successful exploit could allow the attacker to view system files on the affected device, which could contain sensitive information. Software versions 8.8 and 8.9 are affected.

6.5 2019-04-17 CVE-2019-1834

A vulnerability in the internal packet processing of Cisco Aironet Series Access Points (APs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected AP if the switch interface where the AP is connected has port security configured. The vulnerability exists because the AP forwards some malformed wireless client packets outside of the Control and Provisioning of Wireless Access Points (CAPWAP) tunnel. An attacker could exploit this vulnerability by sending crafted wireless packets to an affected AP. A successful exploit could allow the attacker to trigger a security violation on the adjacent switch port, which could result in a DoS condition. Note: Though the Common Vulnerability Scoring System (CVSS) score corresponds to a High Security Impact Rating (SIR), this vulnerability is considered Medium because a workaround is available and exploitation requires a specific switch configuration. There are workarounds that address this vulnerability.

6.7 2019-04-17 CVE-2019-1829

A vulnerability in the CLI of Cisco Aironet Series Access Points (APs) could allow an authenticated, local attacker to gain access to the underlying Linux operating system (OS) without the proper authentication. The attacker would need valid administrator device credentials. The vulnerability is due to improper validation of user-supplied input for certain CLI commands. An attacker could exploit this vulnerability by authenticating to an affected device and submitting crafted input for a CLI command. A successful exploit could allow the attacker to obtain access to the underlying Linux OS without proper authentication.

5.7 2019-04-17 CVE-2019-1826

A vulnerability in the quality of service (QoS) feature of Cisco Aironet Series Access Points (APs) could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation on QoS fields within Wi-Fi frames by the affected device. An attacker could exploit this vulnerability by sending malformed Wi-Fi frames to an affected device. A successful exploit could allow the attacker to cause the affected device to crash, resulting in a DoS condition.

7.5 2017-05-16 CVE-2017-3873

A vulnerability in the Plug-and-Play (PnP) subsystem of the Cisco Aironet 1800, 2800, and 3800 Series Access Points running a Lightweight Access Point (AP) or Mobility Express image could allow an unauthenticated, adjacent attacker to execute arbitrary code with root privileges. The vulnerability is due to insufficient validation of PnP server responses. The PnP feature is only active while the device does not contain a configuration, such as a first time boot or after a factory reset has been issued. An attacker with the ability to respond to PnP configuration requests from the affected device can exploit the vulnerability by returning malicious PnP responses. If a Cisco Application Policy Infrastructure Controller - Enterprise Module (APIC-EM) is available on the network, the attacker would need to exploit the issue in the short window before a valid PnP response was received. If successful, the attacker could gain the ability to execute arbitrary code with root privileges on the underlying operating system of the device. Cisco has confirmed that the only vulnerable software version is 8.3.102.0. Cisco Bug IDs: CSCvb42386.

9.8 2017-04-06 CVE-2017-3834

A vulnerability in Cisco Aironet 1830 Series and Cisco Aironet 1850 Series Access Points running Cisco Mobility Express Software could allow an unauthenticated, remote attacker to take complete control of an affected device. The vulnerability is due to the existence of default credentials for an affected device that is running Cisco Mobility Express Software, regardless of whether the device is configured as a master, subordinate, or standalone access point. An attacker who has layer 3 connectivity to an affected device could use Secure Shell (SSH) to log in to the device with elevated privileges. A successful exploit could allow the attacker to take complete control of the device. This vulnerability affects Cisco Aironet 1830 Series and Cisco Aironet 1850 Series Access Points that are running an 8.2.x release of Cisco Mobility Express Software prior to Release 8.2.111.0, regardless of whether the device is configured as a master, subordinate, or standalone access point. Release 8.2 was the first release of Cisco Mobility Express Software for next generation Cisco Aironet Access Points. Cisco Bug IDs: CSCva50691.

CWE : Common Weakness Enumeration

%idName
60% (3) CWE-20 Improper Input Validation
20% (1) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
20% (1) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...

Snort® IPS/IDS

Date Description
2017-05-04 Cisco Aironet Mobility Express PnP agent directory traversal attempt
RuleID : 42489 - Type : SERVER-OTHER - Revision : 1