Cisco Wireless Bridge Configuration Vulnerable to Unauthorized Changes

A vulnerability exists in Cisco’s Aironet 340 Series Wireless bridges that makes it possible for an attacker to view or modify the bridge configuration via the Web interface, even when you disable this access in the configuration.

Ken Pfeil

March 6, 2001

1 Min Read
ITPro Today logo in a gray background | ITPro Today

Reported March 07, 2001, by CiscoSystems.

VERSIONS AFFECTED

  • Aironet AP4500

  • Aironet AP4800

  • Aironet BR100

  • Aironet BR500

  • Aironet Air-BR340

DESCRIPTION

Avulnerability exists in Cisco’s Aironet 340 Series Wireless bridges that makesit possible for an attacker to view or modify the bridge configuration by using the Web interface, even when you disable this access in the configuration. Anattacker can exploit this vulnerability over both the wired and wirelessEthernet interfaces.

 

VENDOR RESPONSE

 

The vendor recommends that anyone using theseproducts with firmware 7.x, 8.07, or 8.24 upgrade to firmware 8.55. Ciscohas issued an advisoryregarding this vulnerability.

 

CREDIT

Discovered by Cisco.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like