Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-12281

Опубликовано: 02 нояб. 2017
Источник: nvd
CVSS3: 7.5
CVSS2: 5.4
EPSS Низкий

Описание

A vulnerability in the implementation of Protected Extensible Authentication Protocol (PEAP) functionality for standalone configurations of Cisco Aironet 1800, 2800, and 3800 Series Access Points could allow an unauthenticated, adjacent attacker to bypass authentication and connect to an affected device. The vulnerability exists because the affected device uses an incorrect default configuration setting of fail open when running in standalone mode. An attacker could exploit this vulnerability by attempting to connect to an affected device. A successful exploit could allow the attacker to bypass authentication and connect to the affected device. This vulnerability affects Cisco Aironet 1800, 2800, and 3800 Series Access Points that are running a vulnerable software release and use WLAN configuration settings that include FlexConnect local switching and central authentication with MAC filtering. Cisco Bug IDs: CSCvd46314.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:o:cisco:aironet_1800_firmware:-:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:cisco:aironet_1830e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1830i:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1850e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_1850i:-:*:*:*:*:*:*:*
Конфигурация 2

Одновременно

cpe:2.3:o:cisco:aironet_2800_firmware:-:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:cisco:aironet_2800e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_2800i:-:*:*:*:*:*:*:*
Конфигурация 3

Одновременно

cpe:2.3:o:cisco:aironet_3800_firmware:-:*:*:*:*:*:*:*

Одно из

cpe:2.3:h:cisco:aironet_3800e:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_3800i:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:aironet_3800p:-:*:*:*:*:*:*:*

EPSS

Процентиль: 56%
0.00333
Низкий

7.5 High

CVSS3

5.4 Medium

CVSS2

Дефекты

CWE-287
CWE-287

Связанные уязвимости

CVSS3: 7.5
github
больше 3 лет назад

A vulnerability in the implementation of Protected Extensible Authentication Protocol (PEAP) functionality for standalone configurations of Cisco Aironet 1800, 2800, and 3800 Series Access Points could allow an unauthenticated, adjacent attacker to bypass authentication and connect to an affected device. The vulnerability exists because the affected device uses an incorrect default configuration setting of fail open when running in standalone mode. An attacker could exploit this vulnerability by attempting to connect to an affected device. A successful exploit could allow the attacker to bypass authentication and connect to the affected device. This vulnerability affects Cisco Aironet 1800, 2800, and 3800 Series Access Points that are running a vulnerable software release and use WLAN configuration settings that include FlexConnect local switching and central authentication with MAC filtering. Cisco Bug IDs: CSCvd46314.

EPSS

Процентиль: 56%
0.00333
Низкий

7.5 High

CVSS3

5.4 Medium

CVSS2

Дефекты

CWE-287
CWE-287