ID

VAR-201608-0225


CVE

CVE-2016-6362


TITLE

plural Cisco Aironet Vulnerabilities that can be used to gain privileges in device software

Trust: 0.8

sources: JVNDB: JVNDB-2016-004434

DESCRIPTION

Cisco Aironet 1800, 2800, and 3800 devices with software before 8.2.110.0, 8.2.12x before 8.2.121.0, and 8.3.x before 8.3.102.0 allow local users to gain privileges via crafted CLI parameters, aka Bug ID CSCuz24725. Cisco Aironet 1800 , 2800 ,and 3800 The device software contains a privileged vulnerability. Cisco Aironet AccessPoints is a set of wireless access point devices from Cisco. A local attacker could exploit this vulnerability to gain root privileges on the device. This issue is being tracked by Cisco Bug ID CSCuz24725. Cisco Aironet 1800 , 2800 and 3800 Both are American Cisco ( Cisco ) company's router. The following products are affected: using 8.2.110.0 Version, 8.2.121.0 previous 8.2.12x Version, 8.3.102.0 previous 8.3.x version software Cisco Aironet 1800 , 2800 and 3800 equipment

Trust: 2.61

sources: NVD: CVE-2016-6362 // JVNDB: JVNDB-2016-004434 // CNVD: CNVD-2016-06441 // BID: 92513 // VULHUB: VHN-95182 // VULMON: CVE-2016-6362

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2016-06441

AFFECTED PRODUCTS

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.2\(100.0\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.1\(15.14\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.1\(112.3\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.2\(102.43\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.1\(131.0\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.1\(112.4\)

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.3.0

Trust: 1.6

vendor:ciscomodel:aironet access point softwarescope:ltversion:8.3.x

Trust: 0.8

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.2.121.0

Trust: 0.8

vendor:ciscomodel:aironet access point softwarescope:eqversion:8.3.102.0

Trust: 0.8

vendor:ciscomodel:aironet access point softwarescope:ltversion:8.2.12x

Trust: 0.8

vendor:ciscomodel:aironet series access pointscope:eqversion:3800

Trust: 0.6

vendor:ciscomodel:aironet series access pointscope:eqversion:2800

Trust: 0.6

vendor:ciscomodel:aironet series access pointscope:eqversion:1800

Trust: 0.6

vendor:ciscomodel:aironet series access pointsscope:eqversion:38000

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:eqversion:28000

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:eqversion:18000

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:38008.3.102.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:38008.2.121.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:28008.3.102.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:28008.2.121.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:18008.3.102.0

Trust: 0.3

vendor:ciscomodel:aironet series access pointsscope:neversion:18008.2.121.0

Trust: 0.3

sources: CNVD: CNVD-2016-06441 // BID: 92513 // JVNDB: JVNDB-2016-004434 // CNNVD: CNNVD-201608-331 // NVD: CVE-2016-6362

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2016-6362
value: HIGH

Trust: 1.0

NVD: CVE-2016-6362
value: HIGH

Trust: 0.8

CNVD: CNVD-2016-06441
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201608-331
value: HIGH

Trust: 0.6

VULHUB: VHN-95182
value: HIGH

Trust: 0.1

VULMON: CVE-2016-6362
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2016-6362
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2016-06441
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-95182
severity: HIGH
baseScore: 7.2
vectorString: AV:L/AC:L/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.9
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2016-6362
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2016-06441 // VULHUB: VHN-95182 // VULMON: CVE-2016-6362 // JVNDB: JVNDB-2016-004434 // CNNVD: CNNVD-201608-331 // NVD: CVE-2016-6362

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-95182 // JVNDB: JVNDB-2016-004434 // NVD: CVE-2016-6362

THREAT TYPE

local

Trust: 0.9

sources: BID: 92513 // CNNVD: CNNVD-201608-331

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201608-331

CONFIGURATIONS

sources: JVNDB: JVNDB-2016-004434

PATCH

title:cisco-sa-20160817-aap1url:http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160817-aap1

Trust: 0.8

title:Patch for CiscoAironetAccessPoints Platform Empowerment Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/80563

Trust: 0.6

title:Cisco Aironet 1800 , 2800 and 3800 Repair measures for platform escalation vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=63697

Trust: 0.6

title:Cisco: Cisco Aironet 1800, 2800, and 3800 Series Access Point Platforms CLI Privilege Escalation Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20160817-aap1

Trust: 0.1

sources: CNVD: CNVD-2016-06441 // VULMON: CVE-2016-6362 // JVNDB: JVNDB-2016-004434 // CNNVD: CNNVD-201608-331

EXTERNAL IDS

db:NVDid:CVE-2016-6362

Trust: 3.5

db:BIDid:92513

Trust: 2.7

db:SECTRACKid:1036644

Trust: 1.2

db:JVNDBid:JVNDB-2016-004434

Trust: 0.8

db:CNNVDid:CNNVD-201608-331

Trust: 0.7

db:CNVDid:CNVD-2016-06441

Trust: 0.6

db:NSFOCUSid:34594

Trust: 0.6

db:VULHUBid:VHN-95182

Trust: 0.1

db:VULMONid:CVE-2016-6362

Trust: 0.1

sources: CNVD: CNVD-2016-06441 // VULHUB: VHN-95182 // VULMON: CVE-2016-6362 // BID: 92513 // JVNDB: JVNDB-2016-004434 // CNNVD: CNNVD-201608-331 // NVD: CVE-2016-6362

REFERENCES

url:http://www.securityfocus.com/bid/92513

Trust: 2.4

url:http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20160817-aap1

Trust: 2.2

url:http://www.securitytracker.com/id/1036644

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-6362

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-6362

Trust: 0.8

url:http://www.nsfocus.net/vulndb/34594

Trust: 0.6

url:http://www.cisco.com

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/264.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2016-06441 // VULHUB: VHN-95182 // VULMON: CVE-2016-6362 // BID: 92513 // JVNDB: JVNDB-2016-004434 // CNNVD: CNNVD-201608-331 // NVD: CVE-2016-6362

CREDITS

Cisco

Trust: 0.9

sources: BID: 92513 // CNNVD: CNNVD-201608-331

SOURCES

db:CNVDid:CNVD-2016-06441
db:VULHUBid:VHN-95182
db:VULMONid:CVE-2016-6362
db:BIDid:92513
db:JVNDBid:JVNDB-2016-004434
db:CNNVDid:CNNVD-201608-331
db:NVDid:CVE-2016-6362

LAST UPDATE DATE

2024-11-23T22:38:43.770000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2016-06441date:2016-08-19T00:00:00
db:VULHUBid:VHN-95182date:2016-12-12T00:00:00
db:VULMONid:CVE-2016-6362date:2016-12-12T00:00:00
db:BIDid:92513date:2016-08-17T00:00:00
db:JVNDBid:JVNDB-2016-004434date:2016-08-23T00:00:00
db:CNNVDid:CNNVD-201608-331date:2016-08-23T00:00:00
db:NVDid:CVE-2016-6362date:2024-11-21T02:55:58.890

SOURCES RELEASE DATE

db:CNVDid:CNVD-2016-06441date:2016-08-22T00:00:00
db:VULHUBid:VHN-95182date:2016-08-22T00:00:00
db:VULMONid:CVE-2016-6362date:2016-08-22T00:00:00
db:BIDid:92513date:2016-08-17T00:00:00
db:JVNDBid:JVNDB-2016-004434date:2016-08-23T00:00:00
db:CNNVDid:CNNVD-201608-331date:2016-08-18T00:00:00
db:NVDid:CVE-2016-6362date:2016-08-22T10:59:11.120