QID 317233
Date Published: 2022-10-18
QID 317233: Cisco Internetwork Operating System (IOS) XE Software for Embedded Wireless Controllers on Catalyst Access Points Privilege Escalation Vulnerability (cisco-sa-ewc-priv-esc-nderYLtK)
A vulnerability in the self-healing functionality of Cisco IOS XE Software for Embedded Wireless Controllers on Catalyst Access Points could allow an authenticated, local attacker to escape the restricted controller shell and execute arbitrary commands on the underlying operating system of the access point.
Affected Products
Cisco Embedded Wireless Controllers on Catalyst Access Points if they are running a vulnerable release of Cisco IOS XE Software.
QID Detection Logic (Authenticated):
The check matches Cisco IOS XE SDWAN version retrieved via Unix Auth using "show version" command.
QID Detection Logic (Unauthenticated):
The check matches Cisco IOS XE version retrieved via SNMP or TCP/IP Fingerprint or NTP or Telnet.
To successfully exploit this vulnerability, an attacker would need valid credentials for a privilege level 15 user of the wireless controller.
Customers are advised to refer to cisco-sa-ewc-priv-esc-nderYLtK for more information.
- cisco-sa-ewc-priv-esc-nderYLtK -
tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewc-priv-esc-nderYLtK
CVEs related to QID 317233
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-ewc-priv-esc-nderYLtK |
|