Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2023-02976

Опубликовано: 27 сент. 2022
Источник: fstec
CVSS3: 4.7
CVSS2: 3.3
EPSS Низкий

Описание

Уязвимость микропрограммного обеспечения точек доступа Cisco Aironet Access Points и микропрограммного обеспечения контроллеров беспроводного доступа Cisco Wireless LAN Controller (WLC) связана с недостатками разграничения доступа. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, обойти ограничения безопасности

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco Aironet 1540
Cisco Aironet 1560
Cisco Aironet 1800
Cisco Aironet 2800
Cisco Aironet 3800
Cisco Aironet 4800
Catalyst IW 6300
ESW 6300
Cisco Catalyst 9100
Wireless LAN controller
Cisco Business 100 Series Access Points
Cisco Business 200 Series Access Points
Integrated AP on 1100 Integrated Services Routers
Catalyst 9800

Версия ПО

- (Cisco Aironet 1540)
- (Cisco Aironet 1560)
- (Cisco Aironet 1800)
- (Cisco Aironet 2800)
- (Cisco Aironet 3800)
- (Cisco Aironet 4800)
- (Catalyst IW 6300)
- (ESW 6300)
- (Cisco Catalyst 9100)
до 8.10.181.0 (Wireless LAN controller)
- (Cisco Business 100 Series Access Points)
- (Cisco Business 200 Series Access Points)
- (Integrated AP on 1100 Integrated Services Routers)
до 17.3.6 + APSP patch (Catalyst 9800)
от 17.4 до 17.6.2 (Catalyst 9800)

Тип ПО

ПО сетевого программно-аппаратного средства
Микропрограммный код
Сетевое средство

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Низкий уровень опасности (базовая оценка CVSS 2.0 составляет 3,3)
Средний уровень опасности (базовая оценка CVSS 3.0 составляет 4,7)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apvlan-TDTtb4FY

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 22%
0.0007
Низкий

4.7 Medium

CVSS3

3.3 Low

CVSS2

Связанные уязвимости

CVSS3: 4.7
nvd
больше 3 лет назад

A vulnerability in the client forwarding code of multiple Cisco Access Points (APs) could allow an unauthenticated, adjacent attacker to inject packets from the native VLAN to clients within nonnative VLANs on an affected device. This vulnerability is due to a logic error on the AP that forwards packets that are destined to a wireless client if they are received on the native VLAN. An attacker could exploit this vulnerability by obtaining access to the native VLAN and directing traffic directly to the client through their MAC/IP combination. A successful exploit could allow the attacker to bypass VLAN separation and potentially also bypass any Layer 3 protection mechanisms that are deployed.

CVSS3: 4.7
github
больше 3 лет назад

A vulnerability in the client forwarding code of multiple Cisco Access Points (APs) could allow an unauthenticated, adjacent attacker to inject packets from the native VLAN to clients within nonnative VLANs on an affected device. This vulnerability is due to a logic error on the AP that forwards packets that are destined to a wireless client if they are received on the native VLAN. An attacker could exploit this vulnerability by obtaining access to the native VLAN and directing traffic directly to the client through their MAC/IP combination. A successful exploit could allow the attacker to bypass VLAN separation and potentially also bypass any Layer 3 protection mechanisms that are deployed.

EPSS

Процентиль: 22%
0.0007
Низкий

4.7 Medium

CVSS3

3.3 Low

CVSS2