CVE-2016-1418
Published Jun 8, 2016
Last updated 8 years ago
Overview
- Description
- Cisco Aironet Access Point Software 8.2(100.0) on 1830e, 1830i, 1850e, 1850i, 2800, and 3800 access points allows local users to obtain Linux root access via crafted CLI command parameters, aka Bug ID CSCuy64037.
- Source
- ykramarz@cisco.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 5.9
- Exploitability score
- 1.8
- Vector string
- CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4590D445-B4B6-48E6-BF55-BEA6BA763410" }, { "criteria": "cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "848CC5CD-1982-4F31-A626-BD567E1C19F0" }, { "criteria": "cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "24E47788-9B54-42C5-AD83-428B22674575" }, { "criteria": "cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A333CD0B-4729-4E64-8B52-A3F5138F5B70" }, { "criteria": "cpe:2.3:h:cisco:aironet_2800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3C28A6B0-10FF-4C6D-8527-2313E163C98E" }, { "criteria": "cpe:2.3:h:cisco:aironet_3800:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7636F7E2-E386-4F8C-A0C5-F510D8E21DA4" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:aironet_access_point_software_:8.2_\\(100.0\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1F025FB9-9030-483D-AF2A-8403C0C3813D" } ], "operator": "OR" } ], "operator": "AND" } ]