Wednesday, December 11, 2024
HomeCiscoCisco SMB Wireless Access Points Flaw Let Attackers Inject Commands

Cisco SMB Wireless Access Points Flaw Let Attackers Inject Commands

Published on

SIEM as a Service

Cisco has alerted its customers to critical vulnerabilities in the web-based management interface of its Small Business 100, 300, and 500 Series Wireless Access Points (APs).

These flaws could allow an authenticated, remote attacker to perform command injection and buffer overflow attacks.

The vulnerabilities, identified as CVE-2024-20335 and CVE-2024-20336, are particularly concerning because they could enable an attacker with administrative credentials to execute arbitrary code as the root user on the underlying operating system of the affected devices.

- Advertisement - SIEM as a Service

This could lead to a complete compromise of the wireless access points, allowing attackers to intercept, manipulate, or disrupt network traffic.

CVE-2024-20335: Wireless APs Command Injection Vulnerability

An authenticated remote attacker may be able to carry out command injection attacks against a device that is affected by a vulnerability that exists in the web-based management interface of Cisco Small Business 100, 300, and 500 Series Wireless Access Points.

Document
Integrate ANY.RUN in your company for Effective Malware Analysis

Are you from SOC and DFIR teams? – Join With 400,000 independent Researchers

Malware analysis can be fast and simple. Just let us show you the way to:

  • Interact with malware safely
  • Set up virtual machine in Linux and all Windows OS versions
  • Work in a team
  • Get detailed reports with maximum data
  • If you want to test all these features now with completely free access to the sandbox: ..


The attacker must possess legitimate administrator credentials for the connected device to take advantage of this vulnerability.

CVE-2024-20336:Wireless APs Buffer Overflow Vulnerability

A weakness in the web-based user interface of Cisco Small Business 100, 300, and 500 Series Wireless APs could make it possible for an authenticated remote attacker to carry out buffer overflow attacks against a vulnerable device.

The attacker must possess legitimate administrator credentials for the connected device to take advantage of this vulnerability.

Recommendations for Affected Users

Users of the affected Cisco Small Business Wireless APs are advised to take immediate action to reduce the risk of exploitation.

Since no patches will be provided for these vulnerabilities, replacing the affected devices is the only secure course of action.

Cisco has issued end-of-life announcements for the impacted products, urging customers to transition to newer models that will continue to receive security updates and support.

Table of Affected and Fixed Versions

Affected Product SeriesAffected Firmware ReleasesFixed Version
Cisco Small Business 100 Series APsAll releasesMigrate to Cisco Business Access Point Series
Cisco Small Business 300 Series APsAll releasesMigrate to Cisco Business Access Point Series
Cisco Small Business 500 Series APsAll releasesMigrate to Cisco Business Access Point Series

Security Advisory Details

The vulnerabilities are independent of each other, meaning that the exploitation of one does not necessitate or facilitate the exploitation of the other.

The command injection vulnerability (CVE-2024-20335) and the buffer overflow vulnerability (CVE-2024-20336) both have a Security Impact Rating (SIR) of Medium and a Common Vulnerability Scoring System (CVSS) Base Score of 6.5.

The discovery of these vulnerabilities underscores the importance of maintaining up-to-date and supported hardware within network infrastructures.

Cisco’s advisories and the end-of-life process for outdated products remind businesses to regularly review and update their network components.

Customers affected by these vulnerabilities should consult Cisco’s advisories and contact the Cisco Technical Assistance Center (TAC) or their maintenance providers for guidance on migrating to supported devices.

The Cisco PSIRT has not been made aware of any public announcements or malicious use of these vulnerabilities, but given the severity of the flaws, affected users should not delay in taking appropriate action to secure their networks.

You can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits, with Perimeter81 malware protection. All are incredibly harmful, can wreak havoc, and damage your network.

Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Resecurity introduces Government Security Operations Center (GSOC) at NATO Edge 2024

Resecurity, a global leader in cybersecurity solutions, unveiled its advanced Government Security Operations Center...

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and...

US Charged Chinese Hackers for Exploiting Thousands of Firewall

The US Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned Sichuan Silence...

DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet

DMD Diamond - one of the oldest blockchain projects in the space has announced the...

API Security Webinar

72 Hours to Audit-Ready API Security

APIs present a unique challenge in this landscape, as risk assessment and mitigation are often hindered by incomplete API inventories and insufficient documentation.

Join Vivek Gopalan, VP of Products at Indusface, in this insightful webinar as he unveils a practical framework for discovering, assessing, and addressing open API vulnerabilities within just 72 hours.

Discussion points

API Discovery: Techniques to identify and map your public APIs comprehensively.
Vulnerability Scanning: Best practices for API vulnerability analysis and penetration testing.
Clean Reporting: Steps to generate a clean, audit-ready vulnerability report within 72 hours.

More like this

Reserachers Uncovered Zloader DNS Tunneling Tactics For Stealthy C2 Communication

Zloader, a sophisticated Trojan, has recently evolved with features that enhance its stealth and...

US Charged Chinese Hackers for Exploiting Thousands of Firewall

The US Treasury Department's Office of Foreign Assets Control (OFAC) has sanctioned Sichuan Silence...

DMD Diamond Launches Open Beta for v4 Blockchain Ahead of 2025 Mainnet

DMD Diamond - one of the oldest blockchain projects in the space has announced the...