A vulnerability has been found in Cisco Wireless LAN Controller (the affected version is unknown) and classified as critical. Affected by this vulnerability is an unknown function of the component TrustSec Domain Handler. The manipulation with an unknown input leads to a privilege escalation vulnerability. The CWE definition for the vulnerability is CWE-269. As an impact it is known to affect confidentiality, integrity, and availability.
The weakness was published 10/17/2018 as cisco-sa-20181017-wlan-escalat as confirmed advisory (Website). The advisory is shared at tools.cisco.com. This vulnerability is known as CVE-2018-15395 since 08/17/2018. Access to the local network is required for this attack. The successful exploitation requires a single authentication. Neither technical details nor an exploit are publicly available. The price for an exploit might be around USD $5k-$25k at the moment (estimation calculated on 10/18/2018).
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
CPE
CVSSv3
VulDB Meta Base Score: 5.5
VulDB Meta Temp Score: 5.5
VulDB Base Score:
5.5VulDB Temp Score:
5.5VulDB Vector:
🔒VulDB Reliability:
🔍CVSSv2
VulDB Base Score:
🔒VulDB Temp Score:
🔒VulDB Reliability:
🔍Exploiting
Class: Privilege escalation (
CWE-269)
Local: No
Remote: Partially
Availability: No
Price Prediction:
🔍Current Price Estimation:
🔒Threat Intelligence
Threat:
🔍Adversaries:
🔍Geopolitics:
🔍Economy:
🔍Predictions:
🔍Actions:
🔍Countermeasures
Recommended: no mitigation known
0-Day Time:
🔒Timeline
08/17/2018 CVE assigned10/17/2018 Advisory disclosed10/18/2018 VulDB entry created10/18/2018 VulDB last updateSources
Advisory:
cisco-sa-20181017-wlan-escalatStatus: Confirmed
CVE:
CVE-2018-15395 (
🔒)
Entry
Created: 10/18/2018
Complete:
🔍Lien vers l'article source