#VU12373 Improper authentication in Cisco Aironet 3700 Series


Published: 2018-05-07 | Updated: 2018-05-07

Vulnerability identifier: #VU12373

Vulnerability risk: Low

CVSSv3.1: 5.5 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-0247

CWE-ID: CWE-287

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Cisco Aironet 3700 Series
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor: Cisco Systems, Inc

Description
The vulnerability allows an adjacent unauthenticated attacker to bypass security restrictions on the target system.

The weakness exists due to incorrect implementation of authentication for WebAuth clients in a specific configuration. An adjacent attacker can send traffic to local network resources without having gone through authentication, bypass authentication and pass traffic.

Mitigation
Update Cisco 5500 Series Wireless Controllers to 15.3(3)JF15.3(3)JE, 15.3(3)JD7, 15.3(3)JD5, 15.3(3)JC7, 8.5(103.0), 8.5(1.79), 8.5(1.78), 8.4(100.0), 8.4(2.65), 8.3(121.0), 8.3(114.29), 8.2(160.0), 8.2(154.27) or 8.2(154.23) or Cisco Aironet 3700 Series to 15.3(3)JG15.3(3)JF2, 15.3(3)JD13, 8.7(102.0), 8.7(1.54), 8.7(1.52), 8.6(101.0), 8.6(1.144), 8.6(1.143), 8.5(110.0), 8.5(107.77), 8.3(140.0), 8.3(134.25) or 8.2(167.9).










  

Vulnerable software versions

Cisco Aironet 3700 Series: 8.3.104.105 - 8.5.107.52


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-aironet-auth


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability