// For flags

CVE-2018-0420

Cisco Wireless LAN Controller Software Directory Traversal Vulnerability

Severity Score

6.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames and pathnames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files on the targeted device, which may contain sensitive information.

Una vulnerabilidad en la interfaz web de Cisco Wireless LAN Controller Software podría permitir que un atacante remoto autenticado vea información sensible. El problema se debe al saneamiento incorrecto de entradas proporcionadas por el usuario en parámetros de petición HTTP que describen nombres de archivo y ruta. Un atacante podría explotar esta vulnerabilidad empleando técnicas de salto de directorio para enviar una ruta a una ubicación de archivo deseada. Su explotación con éxito podría permitir que el atacante vea archivos en el dispositivo objetivo que podrían contener información sensible.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-11-27 CVE Reserved
  • 2018-10-17 CVE Published
  • 2024-08-01 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Wireless Lan Controller Software
Search vendor "Cisco" for product "Wireless Lan Controller Software"
8.2\(151.0\)
Search vendor "Cisco" for product "Wireless Lan Controller Software" and version "8.2\(151.0\)"
-
Affected