Vulnerabilities > Cisco > Aironet Access Point Firmware
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-04-18 | CVE-2019-1835 | Path Traversal vulnerability in Cisco Aironet Access Point Firmware 8.8/8.9 A vulnerability in the CLI of Cisco Aironet Access Points (APs) could allow an authenticated, local attacker to access sensitive information stored in an AP. | 4.4 |
2019-04-18 | CVE-2019-1834 | Improper Input Validation vulnerability in Cisco Aironet Access Point Firmware A vulnerability in the internal packet processing of Cisco Aironet Series Access Points (APs) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected AP if the switch interface where the AP is connected has port security configured. | 6.5 |
2019-04-18 | CVE-2019-1829 | OS Command Injection vulnerability in Cisco Aironet Access Point Firmware A vulnerability in the CLI of Cisco Aironet Series Access Points (APs) could allow an authenticated, local attacker to gain access to the underlying Linux operating system (OS) without the proper authentication. | 6.7 |
2019-04-18 | CVE-2019-1826 | Improper Input Validation vulnerability in Cisco Aironet Access Point Firmware 8.5(131.3) A vulnerability in the quality of service (QoS) feature of Cisco Aironet Series Access Points (APs) could allow an authenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. | 5.7 |
2017-05-16 | CVE-2017-3873 | Improper Input Validation vulnerability in Cisco Aironet Access Point Firmware 8.3102.0 A vulnerability in the Plug-and-Play (PnP) subsystem of the Cisco Aironet 1800, 2800, and 3800 Series Access Points running a Lightweight Access Point (AP) or Mobility Express image could allow an unauthenticated, adjacent attacker to execute arbitrary code with root privileges. | 7.5 |
2017-04-06 | CVE-2017-3834 | Insecure Default Initialization of Resource vulnerability in Cisco Aironet Access Point Firmware A vulnerability in Cisco Aironet 1830 Series and Cisco Aironet 1850 Series Access Points running Cisco Mobility Express Software could allow an unauthenticated, remote attacker to take complete control of an affected device. | 9.8 |