cisco wireless-lan-controller-software CVE-2018-0382 is a vulnerability in Cisco Wireless Lan Controller Software
Published on April 17, 2019

Cisco Wireless LAN Controller Software Session Hijacking Vulnerability
A vulnerability in the session identification management functionality of the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system. The vulnerability exists because the affected software does not properly clear previously assigned session identifiers for a user session when a user authenticates to the web-based interface. An attacker could exploit this vulnerability by using an existing session identifier to connect to the software through the web-based interface. Successful exploitation could allow the attacker to hijack an authenticated user's browser session on the system. Versions 8.1 and 8.5 are affected.

Vendor Advisory NVD

Weakness Type

What is an authentification Vulnerability?

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

CVE-2018-0382 has been classified to as an authentification vulnerability or weakness.


Products Associated with CVE-2018-0382

Want to know whenever a new CVE is published for Cisco Wireless Lan Controller Software? stack.watch will email you.

 

Affected Versions

Cisco Wireless LAN Controller (WLC):

Exploit Probability

EPSS
0.70%
Percentile
71.72%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.