7.2
CVSSv2

CVE-2015-6315

Published: 13/10/2015 Updated: 12/12/2016
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 641
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in the command-line interface (CLI) of the Cisco Aironet 1850 Series Access Point device could allow an authenticated, local malicious user to obtain elevated privileges to the restricted shell on the device. The vulnerability is due to a lack of proper escape protections when validating CLI commands entered at the device prompt. An authenticated attacker could exploit this vulnerability by entering malicious commands at the CLI to obtain access to the restricted shell. An exploit could allow the malicious user to obtain root-level privileges on the affected device. Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151005-aironet

Vulnerable Product Search on Vulmon Subscribe to Product

cisco aironet access point software 8.1\\(112.4\\)

Vendor Advisories

A vulnerability in the command-line interface (CLI) of the Cisco Aironet 1850 Series Access Point device could allow an authenticated, local attacker to obtain elevated privileges to the restricted shell on the device The vulnerability is due to a lack of proper escape protections when validating CLI commands entered at the device prompt An auth ...