Cisco WCS SQL Injection Vulnerability: CSCtf37019



Cisco: 802 11 frames with Cisco VIP George Stefanick
Fluke Networks: Minimize Wi Fi Network Downtime
Aruba: Packets never lie: An in-depth overview of 802.11 frames
ATM15 Ten Talk “Wifi drivers and devices”
Houston Methodist Innovates with Wireless Technology
Bruce Frederick Antennas (1/2)
Bruce Frederick dB,dBi,dBd (2/2)
Cisco AP Group Nugget
Shawn Jackman (Jack) CWNE#54 is a personal friend and has been a mentor to me for many years. I've had the pleasure and opportunity to work with Jack for 4 years. Jack is a great teacher who takes complex 802.11 standards and breaks them down so almost anyone can understand the concept at hand. I'm excited for you brother. Great job and job well done! Put another notch in the belt!
Note: Cisco WCS software release 7.0 is not affected by this vulnerability. Cisco WCS version 7.0.164.0 (which is the first 7.0 version) already contains the fix for this vulnerability. Cisco WCS software releases prior to 6.0 are not affected by this vulnerability.
The version of WCS software installed on a particular device can be found via the Cisco WCS HTTP management interface. Choose Help > About the Software to obtain the software version.
Cisco WCS enables an administrator to configure and monitor one or more WLCs and associated access points.
A SQL injection vulnerability exists in Cisco WCS. Exploitation could allow an authenticated attacker to modify system configuration; create, modify and delete users; or modify the configuration of wireless devices managed by WCS.
This vulnerability is documented in Cisco bug ID CSCtf37019 ( registered customers only) and has been assigned Common Vulnerabilities and Exposures (CVE) ID CVE-2010-2826.
Read more about this field notice:
Reader Comments