"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-04-17 22:00:46 +00:00
parent ad42c6c109
commit 9835afa796
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
8 changed files with 17 additions and 17 deletions

View File

@ -151,4 +151,4 @@
],
"discovery": "INTERNAL"
}
}
}

View File

@ -84,4 +84,4 @@
],
"discovery": "INTERNAL"
}
}
}

View File

@ -45,7 +45,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the development shell (devshell) authentication for Cisco Aironet Series Access Points (APs) running the Cisco AP-COS operating system could allow an authenticated, local attacker to access the development shell without proper authentication, which allows for root access to the underlying Linux OS. The attacker would need valid device credentials. The vulnerability exists because the software improperly validates user-supplied input at the CLI authentication prompt for development shell access. An attacker could exploit this vulnerability by authenticating to the device and entering crafted input at the CLI. A successful exploit could allow the attacker to access the AP development shell without proper authentication, which allows for root access to the underlying Linux OS. Software versions prior to 8.3.150.0, 8.5.135.0, and 8.8.100.0 are affected."
"value": "A vulnerability in the development shell (devshell) authentication for Cisco Aironet Series Access Points (APs) running the Cisco AP-COS operating system could allow an authenticated, local attacker to access the development shell without proper authentication, which allows for root access to the underlying Linux OS. The attacker would need valid device credentials. The vulnerability exists because the software improperly validates user-supplied input at the CLI authentication prompt for development shell access. An attacker could exploit this vulnerability by authenticating to the device and entering crafted input at the CLI. A successful exploit could allow the attacker to access the AP development shell without proper authentication, which allows for root access to the underlying Linux OS. Software versions prior to 8.3.150.0, 8.5.135.0, and 8.8.100.0 are affected."
}
]
},
@ -92,4 +92,4 @@
],
"discovery": "INTERNAL"
}
}
}

View File

@ -17,13 +17,13 @@
"version": {
"version_data": [
{
"version_affected": "<",
"version_value": "6.5.2"
},
{
"version_affected": "<",
"version_value": "6.6.1"
}
"version_affected": "<",
"version_value": "6.5.2"
},
{
"version_affected": "<",
"version_value": "6.6.1"
}
]
}
}
@ -41,7 +41,7 @@
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the TCP flags inspection feature for access control lists (ACLs) on Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass protection offered by a configured ACL on an affected device. The vulnerability is due to incorrect processing of the ACL applied to an interface of an affected device when Cisco Express Forwarding load balancing using the 3-tuple hash algorithm is enabled. An attacker could exploit this vulnerability by sending traffic through an affected device that should otherwise be denied by the configured ACL. An exploit could allow the attacker to bypass protection offered by a configured ACL on the affected device. There are workarounds that address this vulnerability. Affected Cisco IOS XR versions are: Cisco IOS XR Software Release 5.1.1 and later till first fixed. First Fixed Releases: 6.5.2 and later, 6.6.1 and later."
"value": "A vulnerability in the TCP flags inspection feature for access control lists (ACLs) on Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass protection offered by a configured ACL on an affected device. The vulnerability is due to incorrect processing of the ACL applied to an interface of an affected device when Cisco Express Forwarding load balancing using the 3-tuple hash algorithm is enabled. An attacker could exploit this vulnerability by sending traffic through an affected device that should otherwise be denied by the configured ACL. An exploit could allow the attacker to bypass protection offered by a configured ACL on the affected device. There are workarounds that address this vulnerability. Affected Cisco IOS XR versions are: Cisco IOS XR Software Release 5.1.1 and later till first fixed. First Fixed Releases: 6.5.2 and later, 6.6.1 and later."
}
]
},
@ -88,4 +88,4 @@
],
"discovery": "INTERNAL"
}
}
}

View File

@ -88,4 +88,4 @@
],
"discovery": "INTERNAL"
}
}
}

View File

@ -84,4 +84,4 @@
],
"discovery": "INTERNAL"
}
}
}

View File

@ -96,4 +96,4 @@
],
"discovery": "INTERNAL"
}
}
}

View File

@ -84,4 +84,4 @@
],
"discovery": "INTERNAL"
}
}
}