CVE-2009-0062
Published Feb 5, 2009
Last updated 6 years ago
Overview
- Description
- Unspecified vulnerability in the Cisco Wireless LAN Controller (WLC), Cisco Catalyst 6500 Wireless Services Module (WiSM), and Cisco Catalyst 3750 Integrated Wireless LAN Controller with software 4.2.173.0 allows remote authenticated users to gain privileges via unknown vectors, as demonstrated by escalation from the (1) Lobby Admin and (2) Local Management User privilege levels.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D797EE92-8C85-4C83-A96A-DF1922712742" }, { "criteria": "cpe:2.3:h:cisco:catalyst_3750_series_integrated_wireless_lan_controller:4.2.173.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7116274D-F131-42CC-99DA-F22CC39E4525" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_wireless_services_modules:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E96B28A-CF63-48C9-8B8E-8BC432A6A5EF" }, { "criteria": "cpe:2.3:h:cisco:catalyst_6500_wireless_services_modules:4.2.173.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75E04EA5-F134-4930-97CB-BD68484403FF" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC1E1F40-ECB6-42FB-838E-998B1893D5CB" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:4.2.173.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57C6B8CB-9277-463B-84EB-AEF36EE40E7B" } ], "operator": "OR" } ] } ]