Authentication Bypass Vulnerability in Cisco Aironet Access Points
CVE-2017-12281

7.5HIGH

Key Information:

Vendor
Cisco
Vendor
CVE Published:
2 November 2017

Summary

A security flaw in the implementation of Protected Extensible Authentication Protocol (PEAP) affects standalone configurations of Cisco Aironet 1800, 2800, and 3800 Series Access Points. This vulnerability arises from an incorrect default setting that enables a 'fail open' mode when operating in standalone configuration. An attacker positioned adjacent to the device could exploit this weakness, allowing them to bypass authentication checks and connect to the network without proper credentials. This exploitation could lead to unauthorized access, posing risks to network integrity and security, particularly when configurations involve FlexConnect local switching and central authentication with MAC filtering.

Affected Version(s)

Cisco Aironet 1800, 2800, and 3800 Series Access Points Cisco Aironet 1800, 2800, and 3800 Series Access Points

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.