Command Injection Vulnerability in Cisco Unified Industrial Wireless Software Could Allow Remote Root Access

CVE-2024-20418
10CRITICAL

Key Information

Vendor
Cisco
Status
Cisco Aironet Access Point Software (iOS Xe Controller)
Vendor
CVE Published:
6 November 2024

Badges

πŸ˜„ TrendedπŸ‘Ύ Exploit ExistsπŸ“° News Worthy

Summary

A critical security vulnerability, CVE-2024-20418, has been discovered in the web-based management interface of Cisco Unified Industrial Wireless Software for Ultra-Reliable Wireless Backhaul (URWB) Access Points. It allows an unauthenticated, remote attacker to execute root-level commands on the underlying operating system. The lack of input validation in the web interface enables remote unauthorized users to inject commands, potentially leading to complete control of the device. The affected products include Catalyst IW9165D Heavy Duty Access Points, Catalyst IW9165E Rugged Access Points and Wireless Clients, and Catalyst IW9167E Heavy Duty Access Points. Cisco has released patches to address the vulnerability but urges immediate implementation due to the seriousness of the flaw. There are currently no reported exploits in the wild, but the nature of the vulnerability poses a significant risk, especially for critical infrastructure targets.

Affected Version(s)

Cisco Aironet Access Point Software (IOS XE Controller) =

News Articles

CVSS V3.1

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Risk change from: null to: 10 - (CRITICAL)

  • Vulnerability started trending.

  • πŸ‘Ύ

    Exploit exists.

  • First article discovered by GBHackers News

  • Vulnerability published.

Collectors

NVD DatabaseMitre Database5 News Article(s)
.