Vulnerability Description
Cisco Aironet Access Point Software 8.2(100.0) on 1830e, 1830i, 1850e, 1850i, 2800, and 3800 access points allows local users to obtain Linux root access via crafted CLI command parameters, aka Bug ID CSCuy64037.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Aironet 1830E | - |
| Cisco | Aironet 1830I | - |
| Cisco | Aironet 1850E | - |
| Cisco | Aironet 1850I | - |
| Cisco | Aironet 2800 | - |
| Cisco | Aironet 3800 | - |
| Cisco | Aironet Access Point Software | 8.2_\(100.0\) |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20Vendor Advisory
- http://www.securitytracker.com/id/1036042
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20Vendor Advisory
- http://www.securitytracker.com/id/1036042
FAQ
What is CVE-2016-1418?
CVE-2016-1418 is a vulnerability with a CVSS score of 7.8 (HIGH). Cisco Aironet Access Point Software 8.2(100.0) on 1830e, 1830i, 1850e, 1850i, 2800, and 3800 access points allows local users to obtain Linux root access via crafted CLI command parameters, aka Bug ID...
How severe is CVE-2016-1418?
CVE-2016-1418 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-1418?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Aironet 1830E, Cisco Aironet 1830I, Cisco Aironet 1850E, Cisco Aironet 1850I, Cisco Aironet 2800.