CNVD-2016-06441

Vulnerability from cnvd - Published: 2016-08-22
VLAI Severity ?
Title
Cisco Aironet Access Points平台提权漏洞
Description
Cisco Aironet Access Points是美国思科(Cisco)公司的一套无线访问接入点设备。 Cisco Aironet Access Points平台中存在提权漏洞。本地攻击者可利用该漏洞获取设备上的root特权。
Severity
Patch Name
Cisco Aironet Access Points平台提权漏洞的补丁
Patch Description
Cisco Aironet Access Points是美国思科(Cisco)公司的一套无线访问接入点设备。 Cisco Aironet Access Points平台中存在提权漏洞。本地攻击者可利用该漏洞获取设备上的root特权。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-aap1

Reference
http://www.securityfocus.com/bid/92513
Impacted products
Name
['Cisco Aironet 3800 Series Access Point', 'Cisco Aironet 2800 Series Access Point', 'Cisco Aironet 1800 Series Access Point']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "92513"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-6362"
    }
  },
  "description": "Cisco Aironet Access Points\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u65e0\u7ebf\u8bbf\u95ee\u63a5\u5165\u70b9\u8bbe\u5907\u3002\r\n\r\nCisco Aironet Access Points\u5e73\u53f0\u4e2d\u5b58\u5728\u63d0\u6743\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u8bbe\u5907\u4e0a\u7684root\u7279\u6743\u3002",
  "discovererName": "Cisco",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a \r\nhttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-aap1",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2016-06441",
  "openTime": "2016-08-22",
  "patchDescription": "Cisco Aironet Access Points\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u5957\u65e0\u7ebf\u8bbf\u95ee\u63a5\u5165\u70b9\u8bbe\u5907\u3002\r\n\r\nCisco Aironet Access Points\u5e73\u53f0\u4e2d\u5b58\u5728\u63d0\u6743\u6f0f\u6d1e\u3002\u672c\u5730\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u83b7\u53d6\u8bbe\u5907\u4e0a\u7684root\u7279\u6743\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Cisco Aironet Access Points\u5e73\u53f0\u63d0\u6743\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Cisco Aironet 3800 Series Access Point",
      "Cisco Aironet 2800 Series Access Point",
      "Cisco Aironet 1800 Series Access Point"
    ]
  },
  "referenceLink": "http://www.securityfocus.com/bid/92513",
  "serverity": "\u4e2d",
  "submitTime": "2016-08-19",
  "title": "Cisco Aironet Access Points\u5e73\u53f0\u63d0\u6743\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…