cnvd-2016-03858
Vulnerability from cnvd
Title: Cisco Aironet Access Points命令注入漏洞
Description:
Cisco Aironet 1800/2800/3800 Series Access Point是中小型无线网络接入点产品。
Cisco Aironet 1800/2800/3800 Series Access Point的命令行解释程序存在安全漏洞。本地攻击者利用此漏洞可在Linux shell中注入命令,然后以root权限执行这些命令。
Severity: 中
Patch Name: Cisco Aironet Access Points命令注入漏洞的补丁
Patch Description:
Cisco Aironet 1800/2800/3800 Series Access Point是中小型无线网络接入点产品。
Cisco Aironet 1800/2800/3800 Series Access Point的命令行解释程序存在安全漏洞。本地攻击者利用此漏洞可在Linux shell中注入命令,然后以root权限执行这些命令。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160606-aap
Reference: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160606-aap
Impacted products
Name | ['Cisco Aironet 3800 Series Access Points', 'Cisco Aironet 2800 Series Access Points 8.2(100.0)', 'Cisco Aironet 1850i Access Point 8.2(100.0)', 'Cisco Aironet 1850e Access Point 8.2(100.0)', 'Cisco Aironet 1830i Access Point 8.2(100.0)', 'Cisco Aironet 1830e Access Point 8.2(100.0)'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2016-1418" } }, "description": "Cisco Aironet 1800/2800/3800 Series Access Point\u662f\u4e2d\u5c0f\u578b\u65e0\u7ebf\u7f51\u7edc\u63a5\u5165\u70b9\u4ea7\u54c1\u3002\r\n\r\nCisco Aironet 1800/2800/3800 Series Access Point\u7684\u547d\u4ee4\u884c\u89e3\u91ca\u7a0b\u5e8f\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u5229\u7528\u6b64\u6f0f\u6d1e\u53ef\u5728Linux shell\u4e2d\u6ce8\u5165\u547d\u4ee4\uff0c\u7136\u540e\u4ee5root\u6743\u9650\u6267\u884c\u8fd9\u4e9b\u547d\u4ee4\u3002", "discovererName": "Cisco", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a \r\nhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160606-aap", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2016-03858", "openTime": "2016-06-08", "patchDescription": "Cisco Aironet 1800/2800/3800 Series Access Point\u662f\u4e2d\u5c0f\u578b\u65e0\u7ebf\u7f51\u7edc\u63a5\u5165\u70b9\u4ea7\u54c1\u3002\r\n\r\nCisco Aironet 1800/2800/3800 Series Access Point\u7684\u547d\u4ee4\u884c\u89e3\u91ca\u7a0b\u5e8f\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u5229\u7528\u6b64\u6f0f\u6d1e\u53ef\u5728Linux shell\u4e2d\u6ce8\u5165\u547d\u4ee4\uff0c\u7136\u540e\u4ee5root\u6743\u9650\u6267\u884c\u8fd9\u4e9b\u547d\u4ee4\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "Cisco Aironet Access Points\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "Cisco Aironet 3800 Series Access Points", "Cisco Aironet 2800 Series Access Points 8.2(100.0)", "Cisco Aironet 1850i Access Point 8.2(100.0)", "Cisco Aironet 1850e Access Point 8.2(100.0)", "Cisco Aironet 1830i Access Point 8.2(100.0)", "Cisco Aironet 1830e Access Point 8.2(100.0)" ] }, "referenceLink": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160606-aap", "serverity": "\u4e2d", "submitTime": "2016-06-07", "title": "Cisco Aironet Access Points\u547d\u4ee4\u6ce8\u5165\u6f0f\u6d1e" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…