Vulnerability Description
A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames and pathnames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files on the targeted device, which may contain sensitive information.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Wireless Lan Controller Software | 8.2\(151.0\) |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/105671Broken LinkThird Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1041926Broken LinkThird Party AdvisoryVDB Entry
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2Vendor Advisory
- http://www.securityfocus.com/bid/105671Broken LinkThird Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1041926Broken LinkThird Party AdvisoryVDB Entry
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-2Vendor Advisory
FAQ
What is CVE-2018-0420?
CVE-2018-0420 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitizat...
How severe is CVE-2018-0420?
CVE-2018-0420 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-0420?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Wireless Lan Controller Software.