Security Experts:

Connect with us

Hi, what are you looking for?


Network Security

Critical Flaw Allows Unauthorized Access to Cisco Aironet APs

Cisco on Wednesday informed customers that some of its Aironet access points (APs) are affected by a critical vulnerability that can be exploited by a remote attacker to gain unauthorized access to devices.

Cisco on Wednesday informed customers that some of its Aironet access points (APs) are affected by a critical vulnerability that can be exploited by a remote attacker to gain unauthorized access to devices.

The flaw, tracked as CVE-2019-15260, is caused by insufficient access control for some URLs, which allows an attacker to gain access with elevated privileges to the device by requesting the unprotected URLs.Cisco Aironet AP

“While the attacker would not be granted access to all possible configuration options, it could allow the attacker to view sensitive information and replace some options with values of their choosing, including wireless network configuration. It would also allow the attacker to disable the AP, creating a denial of service (DoS) condition for clients associated with the AP,” Cisco explained in an advisory.

The vulnerability impacts Aironet 1540, 1560, 1800, 2800, 3800 and 4800 series APs. Patches are included in versions, and

Cisco says the vulnerability was discovered during a support case and there is no evidence of exploitation for malicious purposes.

Cisco revealed on Wednesday that Aironet APs are also impacted by two high-severity vulnerabilities that can be exploited without authentication for denial-of-service (DoS) attacks. One of the flaws impacts the Point-to-Point Tunneling Protocol (PPTP) VPN packet processing functionality, while the other exists in the Control and Provisioning of Wireless Access Points (CAPWAP) protocol.

Other high-severity flaws disclosed by Cisco this week include a remote code execution bug in SPA100 series Analog Telephone Adapters, a DoS flaw in Wireless LAN Controller software, and a cross-site request forgery (CSRF) vulnerability in Small Business Smart and Managed switches.

Except for the SPA100 vulnerability, which can be exploited only with authentication, the other weaknesses can be exploited remotely without authentication. The SPA100 security hole has yet to be patched, but Cisco is working on a fix.

Related: Cisco Patches Critical Flaws in Network Switches

Related: Several Vulnerabilities Found in Cisco Industrial Network Director

Related: Cisco UCS Vulnerabilities Allow Complete Takeover of Affected Systems

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.