A vulnerability in the HTTP management interface for some configurations of Cisco wireless access points could allow a remote attacker to take complete control over the affected device.
Cisco wireless access points allow administrators to create more than one set of authentication credentials (local user list) for the HTTP management interface of their access points. If this feature is enabled on one of the systems affected by this vulnerability, the access point will be automatically reconfigured with no security, and no user credentials will be required to access the access point's HTTP or console port interface.
Note that Cisco says that access points configured with a non-vulnerable version of IOS, then upgraded to a vulnerable version, are not affected unless the device's configuration has been changed.
A remote or local unauthenticated user could gain complete control over an affected access point.
Thanks to Cisco Product Security for reporting this vulnerability.
This document was written by Ryan Giobbi.
|Date First Published:||2006-06-29|
|Date Last Updated:||2006-07-04 12:08 UTC|