A vulnerability in the session identification management functionality of the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system. The vulnerability exists because the affected software does not properly clear previously assigned session identifiers for a user session when a user authenticates to the web-based interface. An attacker could exploit this vulnerability by using an existing session identifier to connect to the software through the web-based interface. Successful exploitation could allow the attacker to hijack an authenticated users browser session on the system. Versions 8.1 and 8.5 are affected.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Wireless_lan_controller_software | Cisco | 8.1(111.0) (including) | 8.1(111.0) (including) |
Wireless_lan_controller_software | Cisco | 8.5(120.0) (including) | 8.5(120.0) (including) |