PT-2024-7681 · Cisco · Cisco Unified Industrial Wireless
Dj Cole
·
Published
2024-11-06
·
Updated
2025-07-31
·
CVE-2024-20418
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
**Name of the Vulnerable Software and Affected Versions:**
Cisco Unified Industrial Wireless Software for Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points versions prior to 17.15.1
Catalyst IW9165D Heavy Duty Access Points versions prior to 17.15.1
Catalyst IW9165E Rugged Access Points and Wireless Clients versions prior to 17.15.1
Catalyst IW9167E Heavy Duty Access Points versions prior to 17.15.1
**Description:**
A vulnerability exists in the web-based management interface of Cisco Unified Industrial Wireless Software for Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points. This flaw allows an unauthenticated, remote attacker to perform command injection attacks with root privileges on the underlying operating system. The vulnerability is due to improper validation of input to the web-based management interface. An attacker could exploit this by sending crafted HTTP requests to the web-based management interface of an affected system. A successful exploit could allow the attacker to execute arbitrary commands with root privileges. This vulnerability is actively exploited in the wild.
**Recommendations:**
- Upgrade Cisco Unified Industrial Wireless Software for Cisco Ultra-Reliable Wireless Backhaul (URWB) Access Points to version 17.15.1 or later.
- Upgrade Catalyst IW9165D Heavy Duty Access Points to version 17.15.1 or later.
- Upgrade Catalyst IW9165E Rugged Access Points and Wireless Clients to version 17.15.1 or later.
- Upgrade Catalyst IW9167E Heavy Duty Access Points to version 17.15.1 or later.
Fix
Command Injection
Weakness Enumeration
Related Identifiers
Affected Products
References · 61
- https://bdu.fstec.ru/vul/2024-09127 · Security Note
- https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-backhaul-ap-cmdinj-R7E28Ecs · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2024-20418 · Security Note
- https://twitter.com/Patrowl_io/status/1854519355423207460 · Twitter Post
- https://twitter.com/the_yellow_fall/status/1854208067728187829 · Twitter Post
- https://twitter.com/router_bugs/status/1856033480918085874 · Twitter Post
- https://twitter.com/transilienceai/status/1858737282359967852 · Twitter Post
- https://twitter.com/socradar/status/1854477827891958090 · Twitter Post
- https://twitter.com/johnwalshiii/status/1876306403431956567 · Twitter Post
- https://twitter.com/Areenzor/status/1854385301898006891 · Twitter Post
- https://twitter.com/transilienceai/status/1858561453248442790 · Twitter Post
- https://twitter.com/alisaesage/status/1855210022806102405 · Twitter Post
- https://twitter.com/transilienceai/status/1856751454088040610 · Twitter Post
- https://twitter.com/IT_news_for_all/status/1854422649834807609 · Twitter Post
- https://twitter.com/_CYOPS/status/1854772892191355016 · Twitter Post