cisco aironet-access-point-software CVE-2019-15260 is a vulnerability in Cisco Aironet Access Point Software
Published on October 16, 2019

Cisco Aironet Access Points Unauthorized Access Vulnerability
A vulnerability in Cisco Aironet Access Points (APs) Software could allow an unauthenticated, remote attacker to gain unauthorized access to a targeted device with elevated privileges. The vulnerability is due to insufficient access control for certain URLs on an affected device. An attacker could exploit this vulnerability by requesting specific URLs from an affected AP. An exploit could allow the attacker to gain access to the device with elevated privileges. While the attacker would not be granted access to all possible configuration options, it could allow the attacker to view sensitive information and replace some options with values of their choosing, including wireless network configuration. It would also allow the attacker to disable the AP, creating a denial of service (DoS) condition for clients associated with the AP.

Vendor Advisory NVD

Weakness Type

What is an Authorization Vulnerability?

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2019-15260 has been classified to as an Authorization vulnerability or weakness.


Products Associated with CVE-2019-15260

Want to know whenever a new CVE is published for Cisco Aironet Access Point Software? stack.watch will email you.

 

Affected Versions

Cisco Aironet Access Point Software:

Exploit Probability

EPSS
7.15%
Percentile
91.46%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.