In addition Cisco said the WCS and the Lightweight Access Points contain multiple vulnerabilities that could result in a denial of service attack.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
In a Cisco advisory issued Thursday, the vendor said there are no known workarounds for these vulnerabilities. Versions of the WCS prior to 18.104.22.168 are affected by the f;aws. Cisco has released free software updates to fix the flaws and is urging customers to upgrade to version 22.214.171.124.
Among some of the issues, Cisco said an authentication system within the WCS contains a privilege escalation vulnerability that allows any user with a valid user name and password to change their account group membership.
If the WCS is configured to back up the data stored on the Cisco Wireless Location Appliance via FTP. An attacker can use the credentials with other properties of the FTP server to read and write to arbitrary files on the server hosting the WCS application. The attacker could alter system files and compromise the server.
Several directories within the WCS page hierarchy are not password protected and could be accessed by an unauthenticated user.