CVE-2018-0420
moderate-risk
Published 2018-10-17
A vulnerability in the web-based interface of Cisco Wireless LAN Controller Software could allow an authenticated, remote attacker to view sensitive information. The issue is due to improper sanitization of user-supplied input in HTTP request parameters that describe filenames and pathnames. An attacker could exploit this vulnerability by using directory traversal techniques to submit a path to a desired file location. A successful exploit could allow the attacker to view system files on the targeted device, which may contain sensitive information.
Do I need to act?
~
2.9% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.5/10
Medium
NETWORK
/ LOW complexity
Affected Products (1)
Affected Vendors
References (6)
Broken Link
http://www.securityfocus.com/bid/105671
Broken Link
http://www.securitytracker.com/id/1041926
Broken Link
http://www.securityfocus.com/bid/105671
Broken Link
http://www.securitytracker.com/id/1041926
35
/ 100
moderate-risk
Severity
24/34 · High
Exploitability
6/34 · Minimal
Exposure
5/34 · Minimal