Cisco has launched safety updates to handle a most severity safety flaw impacting Extremely-Dependable Wi-fi Backhaul (URWB) Entry Factors that would allow unauthenticated, distant attackers to run instructions with elevated privileges.
Tracked as CVE-2024-20418 (CVS rating: 10.0), the vulnerability has been described as stemming from an absence of enter validation to the web-based administration interface of the Cisco Unified Industrial Wi-fi Software program.
“An attacker might exploit this vulnerability by sending crafted HTTP requests to the web-based administration interface of an affected system,” Cisco stated in an advisory launched Wednesday.
“A profitable exploit might enable the attacker to execute arbitrary instructions with root privileges on the underlying working system of the affected system.”
The shortcoming impacts following Cisco merchandise in situations the place the URWB working mode is enabled –
- Catalyst IW9165D Heavy Obligation Entry Factors
- Catalyst IW9165E Rugged Entry Factors and Wi-fi Purchasers
- Catalyst IW9167E Heavy Obligation Entry Factors
The networking gear maker emphasised that merchandise that aren’t working in URWB mode usually are not affected by CVE-2024-20418. It stated the vulnerability was found throughout inside safety testing.
It has been addressed in Cisco Unified Industrial Wi-fi Software program model 17.15.1. Customers who’re on variations 17.14 and earlier are advisable emigrate to a hard and fast launch.
Cisco makes no point out of the flaw being actively exploited within the wild. That stated, it is important that customers transfer shortly to use the newest patches to safe in opposition to potential threats.