Authentication Bypass Vulnerability in Cisco Aironet Access Points
CVE-2017-12281
Key Information:
- Vendor
Cisco
- Vendor
- CVE Published:
- 2 November 2017
What is CVE-2017-12281?
A security flaw in the implementation of Protected Extensible Authentication Protocol (PEAP) affects standalone configurations of Cisco Aironet 1800, 2800, and 3800 Series Access Points. This vulnerability arises from an incorrect default setting that enables a 'fail open' mode when operating in standalone configuration. An attacker positioned adjacent to the device could exploit this weakness, allowing them to bypass authentication checks and connect to the network without proper credentials. This exploitation could lead to unauthorized access, posing risks to network integrity and security, particularly when configurations involve FlexConnect local switching and central authentication with MAC filtering.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Cisco Aironet 1800, 2800, and 3800 Series Access Points Cisco Aironet 1800, 2800, and 3800 Series Access Points
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved