Vulnerability Description
Cisco Aironet 1800, 2800, and 3800 devices with software before 8.2.110.0, 8.2.12x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow local users to gain privileges via crafted CLI parameters, aka Bug ID CSCuz24725.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Aironet Access Point Software | 8.1\(15.14\) |
Related Weaknesses (CWE)
References
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20Vendor Advisory
- http://www.securityfocus.com/bid/92513Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1036644Third Party AdvisoryVDB Entry
- http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20Vendor Advisory
- http://www.securityfocus.com/bid/92513Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1036644Third Party AdvisoryVDB Entry
FAQ
What is CVE-2016-6362?
CVE-2016-6362 is a vulnerability with a CVSS score of 7.8 (HIGH). Cisco Aironet 1800, 2800, and 3800 devices with software before 8.2.110.0, 8.2.12x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow local users to gain privileges via crafted CLI parameters, aka Bug...
How severe is CVE-2016-6362?
CVE-2016-6362 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-6362?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Aironet Access Point Software.