We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2018-0382

Cisco Wireless LAN Controller Software Session Hijacking Vulnerability



Assignercisco
Reserved2017-11-27
Published2019-04-17
Updated2024-11-19

Description

A vulnerability in the session identification management functionality of the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system. The vulnerability exists because the affected software does not properly clear previously assigned session identifiers for a user session when a user authenticates to the web-based interface. An attacker could exploit this vulnerability by using an existing session identifier to connect to the software through the web-based interface. Successful exploitation could allow the attacker to hijack an authenticated user's browser session on the system. Versions 8.1 and 8.5 are affected.



MEDIUM: 5.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Product status

Any version before 8.5(144.5)
affected

References

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-wlan-hijack (20190417 Cisco Wireless LAN Controller Software Session Hijacking Vulnerability) vendor-advisory

http://www.securityfocus.com/bid/108005 (108005) vdb-entry

cve.org CVE-2018-0382

nvd.nist.gov CVE-2018-0382

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2018-0382
Support options

Helpdesk Telegram

Subscribe to our newsletter to learn more about our work.