Executive Risk Summary
"A vulnerability in Cisco IOS XE Software for Wireless LAN Controllers could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system, potentially leading to code execution with root privileges. This is due to a hard-coded JSON Web Token (JWT) that can be exploited via crafted HTTPS requests to the AP file upload interface."
Operational Audit Arsenal
Manual Verification Required
This is a non-Windows asset (Cisco). Use the target asset details above to verify your version against vendor advisories.
Patch Impact Forecast
Network connectivity may be interrupted during the update process
Internal Work Notes
Intelligence Sources
Related Cisco Threats
Scope of Impact
Original NVD Description
"A vulnerability in the Out-of-Band Access Point (AP) Image Download, the Clean Air Spectral Recording, and the client debug bundles features of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, remote attacker to upload arbitrary files to an affected system. This vulnerability is due to the presence of a hard-coded JSON Web Token (JWT) on an affected system. An attacker could exploit this vulnerability by sending crafted HTTPS requests to the AP file upload interface. A successful exploit could allow the attacker to upload files, perform path traversal, and execute arbitrary commands with root privileges."