#VU67708 Improper access control in Cisco Systems, Inc products - CVE-2022-20728
Published: September 27, 2022
6300 Series Embedded Services Access Points
Aironet 1800 Access Points
Aironet 4800 Access Points
Business 100 Series Access Points
Business 200 Series Access Points
Cisco Aironet 1540 Series Access Points
Cisco Aironet 1560 Series Access Points
Cisco Aironet 2800 Series Access Points
Cisco Aironet 3800 Series Access Points
Cisco Catalyst 9100
Catalyst IW6300 AC Heavy Duty Access Point
Integrated AP on 1100 Integrated Services Routers
Cisco Catalyst 9800 Wireless Controller
Cisco Wireless LAN Controller
Cisco Systems, Inc
Description
The vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to a logic error on the AP that forwards packets that are destined to a wireless client if they are received on the native VLAN. A remote non-authenticated attacker on the local network with access to the native VLAN can direct traffic directly to the client through their MAC/IP combination, and as a result bypass VLAN separation and potentially also bypass any Layer 3 protection mechanisms that are deployed.