製品・ソフトウェアに関する情報
Cisco Aironet Access Point における証明書・パスワードの管理に関する脆弱性
Title Cisco Aironet Access Point における証明書・パスワードの管理に関する脆弱性
Summary

Cisco Aironet Access Point には、証明書・パスワードの管理に関する脆弱性が存在します。 ベンダは、本脆弱性を Bug ID CSCva68116 として公開しています。

Possible impacts 情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date May 2, 2018, midnight
Registration Date June 29, 2018, 5:57 p.m.
Last Update June 29, 2018, 5:57 p.m.
CVSS3.0 : 重要
Score 7.5
Vector CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS2.0 : 警告
Score 6
Vector AV:N/AC:M/Au:S/C:P/I:P/A:P
Affected System
シスコシステムズ
Cisco Aironet アクセス ポイント ソフトウェア 8.2.121.0 から 8.5.105.0
Cisco Aironet アクセス ポイント ソフトウェア 8.3.102.0 から 8.5.105.0
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2018年06月29日]
  掲載
June 29, 2018, 5:57 p.m.

NVD Vulnerability Information
CVE-2018-0226
Summary

A vulnerability in the assignment and management of default user accounts for Secure Shell (SSH) access to Cisco Aironet 1800, 2800, and 3800 Series Access Points that are running Cisco Mobility Express Software could allow an authenticated, remote attacker to gain elevated privileges on an affected access point. The vulnerability exists because the Cisco Mobility Express controller of the affected software configures the default SSH user account for an access point to be the first SSH user account that was created for the Mobility Express controller, if an administrator added user accounts directly to the controller instead of using the default configuration or the SSH username creation wizard. Although the user account has read-only privileges for the Mobility Express controller, the account could have administrative privileges for an associated access point. An attacker who has valid user credentials for an affected controller could exploit this vulnerability by using the default SSH user account to authenticate to an affected access point via SSH. A successful exploit could allow the attacker to log in to the affected access point with administrative privileges and perform arbitrary administrative actions. This vulnerability affects the following Cisco products: Aironet 1800 Series Access Points that are running Cisco Mobility Express Software Releases 8.2.121.0 through 8.5.105.0, Aironet 2800 Series Access Points that are running Cisco Mobility Express Software Releases 8.3.102.0 through 8.5.105.0, Aironet 3800 Series Access Points that are running Cisco Mobility Express Software Releases 8.3.102.0 through 8.5.105.0. Cisco Bug IDs: CSCva68116.

Publication Date May 3, 2018, 7:29 a.m.
Registration Date March 1, 2021, 6:35 p.m.
Last Update Nov. 21, 2024, 12:37 p.m.
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:cisco:mobility_express_software:8.3\(90.65\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:mobility_express_software:8.4\(1.65\):*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List