SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Cisco Catalyst Switch Vendors:   Cisco
Cisco Catalyst 4500E Supervisor Engine 8-E Wireless Switch HTTP Request Processing Bug Lets Remote Authenticated Users Gain Elevated Privileges
SecurityTracker Alert ID:  1039457
SecurityTracker URL:  http://securitytracker.com/id/1039457
CVE Reference:   CVE-2017-12226   (Links to External Site)
Date:  Sep 27 2017
Impact:   User access via network
Vendor Confirmed:  Yes  
Version(s): Catalyst 4500E Supervisor Engine 8-E; XE 3.7.0E, 3.7.1E, 3.7.2E, 3.7.3E, 3.7.4E, 3.7.5E
Description:   A vulnerability was reported in Cisco Catalyst 4500E Supervisor Engine 8-E Wireless Switch. A remote authenticated user can gain elevated privileges.

A remote authenticated Lobby Administrator user on the web-based Wireless Controller GUI can trigger an HTTP request validation flaw by authenticating and then changing the state or protocol for their connection to gain full administrator privileges on the target system.

The vendor has assigned bug ID CSCvd73746 to this vulnerability.

Impact:   A remote authenticated Lobby Administrator user can gain full administrator privileges on the target system.
Solution:   No solution was available at the time of this entry.

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ngwc

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ngwc (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC