CVE-2023-20097
Cisco Access Point Software Command Injection Vulnerability
CVSS Score
4.6
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP.
| CWE | CWE-77 |
| Vendor | cisco |
| Product | cisco aironet access point software |
| Ecosystems | |
| Industries | NetworkingTelecommunications |
| Published | Mar 23, 2023 |
| Last Updated | Oct 25, 2024 |
Stay Ahead of the Next One
Get instant alerts for cisco cisco aironet access point software
Be the first to know when new medium vulnerabilities affecting cisco cisco aironet access point software are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Affected Versions
Cisco / Cisco Aironet Access Point Software
n/a