Логотип exploitDog
bind:CVE-2018-15372
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-15372

Количество 3

Количество 3

nvd логотип

CVE-2018-15372

больше 7 лет назад

A vulnerability in the MACsec Key Agreement (MKA) using Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic through a Layer 3 interface of an affected device. The vulnerability is due to a logic error in the affected software. An attacker could exploit this vulnerability by connecting to and passing traffic through a Layer 3 interface of an affected device, if the interface is configured for MACsec MKA using EAP-TLS and is running in access-session closed mode. A successful exploit could allow the attacker to bypass 802.1x network access controls and gain access to the network.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-mv8q-r8fx-2m57

больше 3 лет назад

A vulnerability in the MACsec Key Agreement (MKA) using Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic through a Layer 3 interface of an affected device. The vulnerability is due to a logic error in the affected software. An attacker could exploit this vulnerability by connecting to and passing traffic through a Layer 3 interface of an affected device, if the interface is configured for MACsec MKA using EAP-TLS and is running in access-session closed mode. A successful exploit could allow the attacker to bypass 802.1x network access controls and gain access to the network.

CVSS3: 8.1
EPSS: Низкий
fstec логотип

BDU:2018-01170

больше 7 лет назад

Уязвимость реализации протокола MACsec Key Agreement операционной системы Cisco IOS XE, вызванная ошибками в контроле доступа, позволяющая науршителю получить доступ к сети

CVSS3: 6.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-15372

A vulnerability in the MACsec Key Agreement (MKA) using Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic through a Layer 3 interface of an affected device. The vulnerability is due to a logic error in the affected software. An attacker could exploit this vulnerability by connecting to and passing traffic through a Layer 3 interface of an affected device, if the interface is configured for MACsec MKA using EAP-TLS and is running in access-session closed mode. A successful exploit could allow the attacker to bypass 802.1x network access controls and gain access to the network.

CVSS3: 8.1
0%
Низкий
больше 7 лет назад
github логотип
GHSA-mv8q-r8fx-2m57

A vulnerability in the MACsec Key Agreement (MKA) using Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic through a Layer 3 interface of an affected device. The vulnerability is due to a logic error in the affected software. An attacker could exploit this vulnerability by connecting to and passing traffic through a Layer 3 interface of an affected device, if the interface is configured for MACsec MKA using EAP-TLS and is running in access-session closed mode. A successful exploit could allow the attacker to bypass 802.1x network access controls and gain access to the network.

CVSS3: 8.1
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2018-01170

Уязвимость реализации протокола MACsec Key Agreement операционной системы Cisco IOS XE, вызванная ошибками в контроле доступа, позволяющая науршителю получить доступ к сети

CVSS3: 6.5
0%
Низкий
больше 7 лет назад

Уязвимостей на страницу