Chemical Safety Incidents
Cisco Fixes Aironet Flaws
Friday, April 7, 2017 @ 04:04 PM gHale
Cisco released a patch and a warning saying some of the company’s Aironet access points suffer from a critical flaw that could allow an attacker to take complete control of a vulnerable device.
The issue, tracked as CVE-2017-3834, contains default credentials that could allow a remote attacker who has layer 3 connectivity to log in to a device with elevated privileges via SSH.
The vulnerability impacts Cisco Aironet 1830 and 1850 series APs running an 8.2.x version of the Mobility Express software prior to 220.127.116.11. The company said the weakness can end up leveraged regardless of whether the device is configured as a master, subordinate or standalone AP.
Cisco also said there was a medium severity shell bypass vulnerability affecting Aironet 1800, 2800 and 3800 series APs. A local attacker with root privileges can exploit the flaw to gain root access to the underlying Linux operating system. This root shell is only for advanced troubleshooting and it should not be available to any user, even if they have root privileges.
The networking giant also released advisories focusing on three high severity denial-of-service (DoS) vulnerabilities affecting its Wireless LAN Controller (WLC) software.
These issues affect the Wireless Multimedia Extensions (WME), IPv6 UDP ingress packet processing, and the web management interface components of the WLC software. Remote or adjacent attackers can exploit the flaws without authentication.
Cisco released software updates for each of the affected WLC versions. Workarounds are not available.
Most of these vulnerabilities ended up discovered by Cisco itself and the company said there was no evidence of ongoing exploitation.