๐Ÿ” CVE Alert

CVE-2023-20097

MEDIUM 4.6

Cisco Access Point Software Command Injection Vulnerability

CVSS Score
4.6
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability in Cisco access points (AP) software could allow an authenticated, local attacker to inject arbitrary commands and execute them with root privileges. This vulnerability is due to improper input validation of commands that are issued from a wireless controller to an AP. An attacker with Administrator access to the CLI of the controller could exploit this vulnerability by issuing a command with crafted arguments. A successful exploit could allow the attacker to gain full root access on the AP.

CWE CWE-77
Vendor cisco
Product cisco aironet access point software
Ecosystems
Industries
NetworkingTelecommunications
Published Mar 23, 2023
Last Updated Oct 25, 2024
Stay Ahead of the Next One

Get instant alerts for cisco cisco aironet access point software

Be the first to know when new medium vulnerabilities affecting cisco cisco aironet access point software are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None

Affected Versions

Cisco / Cisco Aironet Access Point Software
n/a

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
sec.cloudapps.cisco.com: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aironetap-cmdinj-6bjT4FL8