CVE-2017-3831
Published Mar 15, 2017
Last updated 5 years ago
Overview
- Description
- A vulnerability in the web-based GUI of Cisco Mobility Express 1800 Series Access Points could allow an unauthenticated, remote attacker to bypass authentication. The attacker could be granted full administrator privileges. The vulnerability is due to improper implementation of authentication for accessing certain web pages using the GUI interface. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web interface of the affected system. A successful exploit could allow the attacker to bypass authentication and perform unauthorized configuration changes or issue control commands to the affected device. This vulnerability affects Cisco Mobility Express 1800 Series Access Points running a software version prior to 8.2.110.0. Cisco Bug IDs: CSCuy68219.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:aironet_access_point_software:8.1\\(15.14\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88453D71-DAF5-4813-9776-5391C31B1006" }, { "criteria": "cpe:2.3:o:cisco:aironet_access_point_software:8.1\\(112.3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A187F61E-D4A4-4DF9-93B4-981C4B86F284" }, { "criteria": "cpe:2.3:o:cisco:aironet_access_point_software:8.1\\(112.4\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A92A6EC5-E47A-4001-A25C-A1043B346EDE" }, { "criteria": "cpe:2.3:o:cisco:aironet_access_point_software:8.1\\(131.0\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AAE1697B-74D9-4416-AFBA-EAD5C0E5A6E2" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:aironet_1810:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "36F923CF-D4EB-48F8-821D-8BB3A69ABB62" }, { "criteria": "cpe:2.3:h:cisco:aironet_1810w:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1D613A17-FFA9-4FF0-9C2A-AF8ACD59B765" }, { "criteria": "cpe:2.3:h:cisco:aironet_1815i:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "207DC80E-499C-4CA3-8A88-F027DBC64CCF" }, { "criteria": "cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4590D445-B4B6-48E6-BF55-BEA6BA763410" }, { "criteria": "cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "848CC5CD-1982-4F31-A626-BD567E1C19F0" }, { "criteria": "cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "24E47788-9B54-42C5-AD83-428B22674575" }, { "criteria": "cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A333CD0B-4729-4E64-8B52-A3F5138F5B70" } ], "operator": "OR" } ], "operator": "AND" } ]