Cisco Access Point Software command execution | CVE-2023-20097

NAME
__________
Cisco Access Point Software command execution

Platforms Affected:
Cisco Aironet 1540 Series APs
Cisco Aironet 1560 Series APs
Cisco Aironet 1800 Series APs
Cisco Aironet 2800 Series APs
Cisco Aironet 3800 Series APs
Cisco Aironet 4800 APs
Cisco Catalyst 9100 APs
Cisco Integrated AP on 1100 Integrated Services Routers
Cisco 6300 Series Embedded Services APs (ESW6300)
Cisco Catalyst IW6300 Heavy Duty Series APs
Cisco Catalyst IW9165 Heavy Duty Series
Cisco Catalyst IW9165 Rugged Series
Cisco Catalyst IW9167 Heavy Duty Series

Risk Level:
4.6

Exploitability:
Unproven

Consequences:
Gain Access

DESCRIPTION
__________

Cisco Access Point Software could allow a local authenticated attacker to execute arbitrary commands on the system, caused by improper input validation of commands. By sending a command with specially crafted arguments, an attacker could exploit this vulnerability to execute arbitrary commands with root privileges on the system.

CVSS 3.0 Information
__________

Privileges Required:
High

User Interaction:
None

Scope:
Changed

Access Vector:
Local


 


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

Buy Me A Coffee
Patreon

 To keep up to date follow us on the below channels.

join
Telegram
discord
Discord
reddit
Reddit
linkedin
LinkedIn