Логотип exploitDog
bind:CVE-2024-20265
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-20265

Количество 3

Количество 3

nvd логотип

CVE-2024-20265

почти 2 года назад

A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker to bypass the Cisco Secure Boot functionality and load a software image that has been tampered with on an affected device. This vulnerability exists because unnecessary commands are available during boot time at the physical console. An attacker could exploit this vulnerability by interrupting the boot process and executing specific commands to bypass the Cisco Secure Boot validation checks and load an image that has been tampered with. This image would have been previously downloaded onto the targeted device. A successful exploit could allow the attacker to load the image once. The Cisco Secure Boot functionality is not permanently compromised.

CVSS3: 5.9
EPSS: Низкий
github логотип

GHSA-gqw2-gvrw-vqqg

почти 2 года назад

A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker to bypass the Cisco Secure Boot functionality and load a software image that has been tampered with on an affected device. This vulnerability exists because unnecessary commands are available during boot time at the physical console. An attacker could exploit this vulnerability by interrupting the boot process and executing specific commands to bypass the Cisco Secure Boot validation checks and load an image that has been tampered with. This image would have been previously downloaded onto the targeted device. A successful exploit could allow the attacker to load the image once. The Cisco Secure Boot functionality is not permanently compromised.

CVSS3: 5.9
EPSS: Низкий
fstec логотип

BDU:2024-02878

почти 2 года назад

Уязвимость микропрограммного обеспечения точек доступа Cisco Aironet Access Points (AP) серий 1540, 1560, 1800, 2800, 3800, 4800, Catalyst 9105AX, Catalyst 9115, Catalyst 9120AX, Catalyst 9124AX, Catalyst 9130AX и Catalyst 9136, связанняа с нарушением доверительных границ, позволяющая нарушителю обойти ограничения безопасности, выполнить произвольные команды и загрузить измененный образ программного обеспечения

CVSS3: 5.9
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-20265

A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker to bypass the Cisco Secure Boot functionality and load a software image that has been tampered with on an affected device. This vulnerability exists because unnecessary commands are available during boot time at the physical console. An attacker could exploit this vulnerability by interrupting the boot process and executing specific commands to bypass the Cisco Secure Boot validation checks and load an image that has been tampered with. This image would have been previously downloaded onto the targeted device. A successful exploit could allow the attacker to load the image once. The Cisco Secure Boot functionality is not permanently compromised.

CVSS3: 5.9
0%
Низкий
почти 2 года назад
github логотип
GHSA-gqw2-gvrw-vqqg

A vulnerability in the boot process of Cisco Access Point (AP) Software could allow an unauthenticated, physical attacker to bypass the Cisco Secure Boot functionality and load a software image that has been tampered with on an affected device. This vulnerability exists because unnecessary commands are available during boot time at the physical console. An attacker could exploit this vulnerability by interrupting the boot process and executing specific commands to bypass the Cisco Secure Boot validation checks and load an image that has been tampered with. This image would have been previously downloaded onto the targeted device. A successful exploit could allow the attacker to load the image once. The Cisco Secure Boot functionality is not permanently compromised.

CVSS3: 5.9
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-02878

Уязвимость микропрограммного обеспечения точек доступа Cisco Aironet Access Points (AP) серий 1540, 1560, 1800, 2800, 3800, 4800, Catalyst 9105AX, Catalyst 9115, Catalyst 9120AX, Catalyst 9124AX, Catalyst 9130AX и Catalyst 9136, связанняа с нарушением доверительных границ, позволяющая нарушителю обойти ограничения безопасности, выполнить произвольные команды и загрузить измененный образ программного обеспечения

CVSS3: 5.9
0%
Низкий
почти 2 года назад

Уязвимостей на страницу