CVE-2018-0245Sensitive Information Exposure in Cisco Wireless LAN Controller Software

Severity
5.3MEDIUMNVD
EPSS
0.5%
top 34.21%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 2
Latest updateMay 13

Description

A vulnerability in the REST API of Cisco 5500 and 8500 Series Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to view system information that under normal circumstances should be prohibited. The vulnerability is due to incomplete input and validation checking mechanisms in the REST API URL request. An attacker could exploit this vulnerability by sending a malicious URL to the REST API. If successful, an exploit could allow the attacker to view sensitive sys

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages1 packages

NVDcisco/wireless_lan_controller_software8.3\(133.0\), 8.5\(105.0\)+1

🔴Vulnerability Details

2
GHSA
GHSA-p33r-x4hg-wvgw: A vulnerability in the REST API of Cisco 5500 and 8500 Series Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker t2022-05-13
CVEList
CVE-2018-0245: A vulnerability in the REST API of Cisco 5500 and 8500 Series Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker t2018-05-02

📋Vendor Advisories

1
Cisco
Cisco 5500 and 8500 Series Wireless LAN Controller Information Disclosure Vulnerability2018-05-02
CVE-2018-0245 — Sensitive Information Exposure in Cisco | cvebase