Cisco Wireless LAN Controller (WLC) devices with software 4.x, 5.x, 6.0, and 7.0 before 7.0.220.4, when CPU-based ACLs are enabled, allow remote attackers to read or modify the configuration via unspecified vectors, aka Bug ID CSCtu56709.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 01:34
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/bugtraq/2012-02/0188.html - | |
References | () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120229-wlc - Vendor Advisory |
Information
Published : 2012-03-01 01:55
Updated : 2024-11-21 01:34
NVD link : CVE-2012-0371
Mitre link : CVE-2012-0371
CVE.ORG link : CVE-2012-0371
JSON object : View
Products Affected
cisco
- 2000_wireless_lan_controller
- 2100_wireless_lan_controller
- wireless_lan_controller_software
- 4400_wireless_lan_controller
- 2504_wireless_lan_controller
- 2106_wireless_lan_controller
- 4404_wireless_lan_controller
- 5508_wireless_controller
- 2500_wireless_lan_controller
- 4402_wireless_lan_controller
- 2125_wireless_lan_controller
- 4100_wireless_lan_controller
- 2112_wireless_lan_controller
CWE
CWE-264
Permissions, Privileges, and Access Controls