cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1183
Views
5
Helpful
7
Replies

LIGHT TPD VULNERABILITY ON AP 3802E-E-K9

ugwuugochukwuk
Level 1
Level 1

Hello All, 

 

A customer of mine did a vulnerability scan and reported the vulnerability below:

 

"This vulnerability was identified because (1) the detected version of Lighttpd, 1.4.38, is less than 1.4.50
Paths:
/"

 

I tried accessing the device remotely but couldn't log on. We checked the DHCP pool and the device was an Access Point. I'm a bit confused because from my understanding, the lighttpd vulnerability only affects Cisco IOS-XR devices. 

 

I want to confirm if the reported vulnerability also affects Access Points and if it does, how can it be fixed.

 

Thanks in anticipation!!!

7 Replies 7

marce1000
VIP
VIP

 

                                     >... how can it be fixed.

 The best approach usually is to (try) and use the latest advisory software release for the particular cisco device and check if it still vulnerable

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Hello Marce,

 

Thanks for your response.

 

But is an AP supposed to report such vulnerability ?? My research about the vulnerability shows it only affects cisco devices running IOS-XR

 

                      >....But is an AP supposed to report such vulnerability

  - Probably not but your scanning tool will not be wrong neither, so my  advise still remains in place or else you need to verify with other vulnerability scanner that has same reporting capabilities.

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

APs typically don't run a web server, unless they are in Mobility Express mode. 

If you are utilizing that feature, then yes it might be vulnerable: https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvn48153?rfs=iqvred

Rich R
VIP
VIP

CAPWAP APs also contain a webserver for OEAP (Office Extend) functionality where the user gets a simple web interface for managing their client side access.

Disabling Office Extend should disable the web server (though might not?).

You didn't mention whether the AP is ME or CAPWAP or what software version it's running?

Either way as @marce1000 suggested you should, in any case, update to latest software as per https://www.cisco.com/c/en/us/support/docs/wireless/wireless-lan-controller-software/200046-tac-recommended-aireos.html or https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/214749-tac-recommended-ios-xe-builds-for-wirele.html to make sure you eliminate a whole host of other security vulnerabilities that may not have been detected.

Scott Fella
Hall of Fame
Hall of Fame

Out of curiosity, are you running Mobility Express or are these joined to a controller?

-Scott
*** Please rate helpful posts ***

Arshad Safrulla
VIP Alumni
VIP Alumni

You need to ask for CVE ID for the vulnerability they highlighted. Then you can search that CVE ID in the below Cisco database.

Security Advisories (cisco.com)

If it is listed here, you will find the workarounds if there is any. Or open a case with TAC with CVE ID, they will tell you whether it is impacting the AP or not.

Review Cisco Networking for a $25 gift card