Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2018-01416

Опубликовано: 15 авг. 2018
Источник: fstec
CVSS3: 5.3
CVSS2: 1.9
EPSS Низкий

Описание

Уязвимость реализации протокола Extensible Authentication Protocol over LAN (EAPOL) микропрограммного обеспечения маршрутизаторов Cisco серий Small Bussiness 100 Series и Small Bussiness 300 Series вызвана ошибками механизма обработки сообщений EAPOL во время установки соединения Wi-Fi. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, раскрыть защищаемую информацию

Вендор

Cisco Systems Inc.

Наименование ПО

Small Business 300 Series WAP
WAP321 Wireless-N Selectable-Band Access Point with Single Point Setup
WAP121 Wireless-N Access Point with Single Point Setup

Версия ПО

11.0.6.6 (Small Business 300 Series WAP)
11.0.6.6 (WAP321 Wireless-N Selectable-Band Access Point with Single Point Setup)
11.0.6.6 (WAP121 Wireless-N Access Point with Single Point Setup)

Тип ПО

ПО сетевого программно-аппаратного средства

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Низкий уровень опасности (базовая оценка CVSS 2.0 составляет 1,9)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 5,3)

Возможные меры по устранению уязвимости

Использование рекомендаций производителя:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180815-sb-wap-encrypt

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 38%
0.00169
Низкий

5.3 Medium

CVSS3

1.9 Low

CVSS2

Связанные уязвимости

CVSS3: 5.3
nvd
больше 7 лет назад

A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an unauthenticated, adjacent attacker to force the downgrade of the encryption algorithm that is used between an authenticator (access point) and a supplicant (Wi-Fi client). The vulnerability is due to the improper processing of certain EAPOL messages that are received during the Wi-Fi handshake process. An attacker could exploit this vulnerability by establishing a man-in-the-middle position between a supplicant and an authenticator and manipulating an EAPOL message exchange to force usage of a WPA-TKIP cipher instead of the more secure AES-CCMP cipher. A successful exploit could allow the attacker to conduct subsequent cryptographic attacks, which could lead to the disclosure of confidential information. Cisco Bug IDs: CSCvj29229.

CVSS3: 5.3
github
больше 3 лет назад

A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an unauthenticated, adjacent attacker to force the downgrade of the encryption algorithm that is used between an authenticator (access point) and a supplicant (Wi-Fi client). The vulnerability is due to the improper processing of certain EAPOL messages that are received during the Wi-Fi handshake process. An attacker could exploit this vulnerability by establishing a man-in-the-middle position between a supplicant and an authenticator and manipulating an EAPOL message exchange to force usage of a WPA-TKIP cipher instead of the more secure AES-CCMP cipher. A successful exploit could allow the attacker to conduct subsequent cryptographic attacks, which could lead to the disclosure of confidential information. Cisco Bug IDs: CSCvj29229.

EPSS

Процентиль: 38%
0.00169
Низкий

5.3 Medium

CVSS3

1.9 Low

CVSS2