{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-20335","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2023-11-08T15:08:07.642Z","datePublished":"2024-03-06T16:30:39.235Z","dateUpdated":"2024-08-01T21:59:41.400Z"},"containers":{"cna":{"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2024-03-06T17:06:13.554Z"},"descriptions":[{"lang":"en","value":"A vulnerability in the web-based management interface of Cisco Small Business 100, 300, and 500 Series Wireless APs could allow an authenticated, remote attacker to perform command injection attacks against an affected device. In order to exploit this vulnerability, the attacker must have valid administrative credentials for the device. This vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by sending a crafted HTTP request to the web-based management interface of an affected device. A successful exploit could allow the attacker to execute arbitrary code as the root user on the underlying operating system."}],"affected":[{"vendor":"Cisco","product":"Cisco Business Wireless Access Point Software","versions":[{"version":"1.0.0.13","status":"affected"},{"version":"1.0.0.16","status":"affected"},{"version":"1.0.0.3","status":"affected"},{"version":"1.0.0.4","status":"affected"},{"version":"1.0.0.5","status":"affected"},{"version":"1.0.0.7","status":"affected"},{"version":"1.0.1.2","status":"affected"},{"version":"1.0.1.3","status":"affected"},{"version":"1.0.1.5","status":"affected"},{"version":"1.0.1.6","status":"affected"},{"version":"1.0.1.7","status":"affected"},{"version":"1.0.2.0","status":"affected"},{"version":"1.0.3.1","status":"affected"},{"version":"1.0.4.4","status":"affected"},{"version":"1.0.4.3","status":"affected"},{"version":"1.0.1.10","status":"affected"},{"version":"1.0.5.0","status":"affected"},{"version":"1.0.0.10","status":"affected"},{"version":"1.0.0.12","status":"affected"},{"version":"1.0.0.14","status":"affected"},{"version":"1.0.0.15","status":"affected"},{"version":"1.0.0.17","status":"affected"},{"version":"1.0.0.9","status":"affected"},{"version":"1.0.1.11","status":"affected"},{"version":"1.0.1.12","status":"affected"},{"version":"1.0.1.9","status":"affected"},{"version":"1.0.2.6","status":"affected"},{"version":"1.1.0.5","status":"affected"},{"version":"1.1.0.7","status":"affected"},{"version":"1.1.0.9","status":"affected"},{"version":"1.1.1.0","status":"affected"},{"version":"1.1.2.4","status":"affected"},{"version":"1.1.4.6","status":"affected"},{"version":"1.1.3.2","status":"affected"},{"version":"1.1.4.0","status":"affected"},{"version":"1.1.0.3","status":"affected"},{"version":"1.1.0.4","status":"affected"},{"version":"1.1.0.6","status":"affected"},{"version":"1.1.2.3","status":"affected"},{"version":"1.2.0.2","status":"affected"},{"version":"1.2.0.3","status":"affected"},{"version":"1.2.1.3","status":"affected"},{"version":"1.3.0.3","status":"affected"},{"version":"1.3.0.4","status":"affected"},{"version":"1.3.0.6","status":"affected"},{"version":"1.3.0.7","status":"affected"}]}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","type":"cwe","cweId":"CWE-78"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-85G83CRB","name":"cisco-sa-sb-wap-multi-85G83CRB"}],"metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"NONE"}}],"exploits":[{"lang":"en","value":"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory."}],"source":{"advisory":"cisco-sa-sb-wap-multi-85G83CRB","discovery":"EXTERNAL","defects":["CSCwi78277","CSCwi83948","CSCwi78254","CSCwi78271"]}},"adp":[{"affected":[{"vendor":"cisco","product":"business_wireless_access_point_software","cpes":["cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.10:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.12:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.13:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.14:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.15:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.16:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.17:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.3:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.4:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.5:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.7:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.0.9:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.10:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.11:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.12:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.2:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.3:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.5:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.6:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.7:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.1.9:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.2.0:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.2.6:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.3.1:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.4.3:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.4.4:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.0.5.0:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.0.3:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.0.4:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.0.5:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.0.6:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.0.7:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.0.9:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.1.0:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.2.3:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.2.4:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.3.2:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.4.0:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.1.4.6:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.2.0.2:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.2.0.3:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.2.1.3:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.3.0.3:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.3.0.4:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.3.0.6:*:*:*:*:*:*:*","cpe:2.3:a:cisco:business_wireless_access_point_software:1.3.0.7:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"1.0.0.10","status":"affected"},{"version":"1.0.0.12","status":"affected"},{"version":"1.0.0.13","status":"affected"},{"version":"1.0.0.14","status":"affected"},{"version":"1.0.0.15","status":"affected"},{"version":"1.0.0.16","status":"affected"},{"version":"1.0.0.17","status":"affected"},{"version":"1.0.0.3","status":"affected"},{"version":"1.0.0.4","status":"affected"},{"version":"1.0.0.5","status":"affected"},{"version":"1.0.0.7","status":"affected"},{"version":"1.0.0.9","status":"affected"},{"version":"1.0.1.10","status":"affected"},{"version":"1.0.1.11","status":"affected"},{"version":"1.0.1.12","status":"affected"},{"version":"1.0.1.2","status":"affected"},{"version":"1.0.1.3","status":"affected"},{"version":"1.0.1.5","status":"affected"},{"version":"1.0.1.6","status":"affected"},{"version":"1.0.1.7","status":"affected"},{"version":"1.0.1.9","status":"affected"},{"version":"1.0.2.0","status":"affected"},{"version":"1.0.2.6","status":"affected"},{"version":"1.0.3.1","status":"affected"},{"version":"1.0.4.3","status":"affected"},{"version":"1.0.4.4","status":"affected"},{"version":"1.0.5.0","status":"affected"},{"version":"1.1.0.3","status":"affected"},{"version":"1.1.0.4","status":"affected"},{"version":"1.1.0.5","status":"affected"},{"version":"1.1.0.6","status":"affected"},{"version":"1.1.0.7","status":"affected"},{"version":"1.1.0.9","status":"affected"},{"version":"1.1.1.0","status":"affected"},{"version":"1.1.2.3","status":"affected"},{"version":"1.1.2.4","status":"affected"},{"version":"1.1.3.2","status":"affected"},{"version":"1.1.4.0","status":"affected"},{"version":"1.1.4.6","status":"affected"},{"version":"1.2.0.2","status":"affected"},{"version":"1.2.0.3","status":"affected"},{"version":"1.2.1.3","status":"affected"},{"version":"1.3.0.3","status":"affected"},{"version":"1.3.0.4","status":"affected"},{"version":"1.3.0.6","status":"affected"},{"version":"1.3.0.7","status":"affected"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-03-07T14:42:02.782698Z","id":"CVE-2024-20335","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-07-26T15:07:27.344Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:59:41.400Z"},"title":"CVE Program Container","references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-wap-multi-85G83CRB","name":"cisco-sa-sb-wap-multi-85G83CRB","tags":["x_transferred"]}]}]}}