Improper authentication in Cisco Aironet 3700 Series - CVE-2018-0247

 

Improper authentication in Cisco Aironet 3700 Series - CVE-2018-0247

Published: May 7, 2018 / Updated: May 7, 2018


Vulnerability identifier: #VU12373
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0247
CWE-ID: CWE-287
Exploitation vector: Adjecent network
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Aironet 3700 Series

Detailed vulnerability description

The vulnerability allows an adjacent unauthenticated attacker to bypass security restrictions on the target system.

The weakness exists due to incorrect implementation of authentication for WebAuth clients in a specific configuration. An adjacent attacker can send traffic to local network resources without having gone through authentication, bypass authentication and pass traffic.

How to mitigate CVE-2018-0247

Update Cisco 5500 Series Wireless Controllers to 15.3(3)JF15.3(3)JE, 15.3(3)JD7, 15.3(3)JD5, 15.3(3)JC7, 8.5(103.0), 8.5(1.79), 8.5(1.78), 8.4(100.0), 8.4(2.65), 8.3(121.0), 8.3(114.29), 8.2(160.0), 8.2(154.27) or 8.2(154.23) or Cisco Aironet 3700 Series to 15.3(3)JG15.3(3)JF2, 15.3(3)JD13, 8.7(102.0), 8.7(1.54), 8.7(1.52), 8.6(101.0), 8.6(1.144), 8.6(1.143), 8.5(110.0), 8.5(107.77), 8.3(140.0), 8.3(134.25) or 8.2(167.9).










  


Sources