CVE-2019-15260

high-risk
Published 2019-10-16

A vulnerability in Cisco Aironet Access Points (APs) Software could allow an unauthenticated, remote attacker to gain unauthorized access to a targeted device with elevated privileges. The vulnerability is due to insufficient access control for certain URLs on an affected device. An attacker could exploit this vulnerability by requesting specific URLs from an affected AP. An exploit could allow the attacker to gain access to the device with elevated privileges. While the attacker would not be granted access to all possible configuration options, it could allow the attacker to view sensitive information and replace some options with values of their choosing, including wireless network configuration. It would also allow the attacker to disable the AP, creating a denial of service (DoS) condition for clients associated with the AP.

Do I need to act?

~
7.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Products (6)

Aironet 1540 Firmware
Aironet 1560 Firmware
Aironet 1800 Firmware
Aironet 2800 Firmware
Aironet 3800 Firmware
Aironet 4800 Firmware

Affected Vendors

54
/ 100
high-risk
Severity 32/34 · Critical
Exploitability 9/34 · Low
Exposure 13/34 · Low