CVE-2014-0703
Published Mar 6, 2014
Last updated 11 years ago
Overview
- Description
- Cisco Wireless LAN Controller (WLC) devices 7.4 before 7.4.110.0 distribute Aironet IOS software with a race condition in the status of the administrative HTTP server, which allows remote attackers to bypass intended access restrictions by connecting to an Aironet access point on which this server had been disabled ineffectively, aka Bug ID CSCuf66202.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-362
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.100.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D160CAC1-B873-4A78-A50B-5B3FAB6EEDE3" }, { "criteria": "cpe:2.3:o:cisco:wireless_lan_controller_software:7.4.100.60:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D90CC27-03B4-4E8A-B7C7-31CF468CE9B1" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:wireless_lan_controller:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8E08C420-97C2-4323-9388-D6C32E83BBF9" } ], "operator": "OR" } ], "operator": "AND" } ]