Authentication Bypass Vulnerability in Cisco Wireless LAN Controller and Aironet Access Points
CVE-2018-0247
Key Information:
- Vendor
- Cisco
- Vendor
- CVE Published:
- 2 May 2018
Summary
A significant vulnerability exists within the Web Authentication clients of Cisco Wireless LAN Controllers and Aironet Access Points. This security flaw allows unauthenticated, adjacent attackers to bypass the authentication process. The vulnerability arises from an incorrect implementation of authentication mechanisms in certain configurations, particularly in FlexConnect Mode with NAT. Attackers can exploit this flaw to send traffic to local network resources without completing the required authentication. This exploit primarily impacts Cisco Aironet Access Points and Wireless LAN Controllers using specific configurations, enabling unauthorized access and potential traffic manipulation.
Affected Version(s)
Cisco Wireless LAN Controller and Aironet Access Points Cisco Wireless LAN Controller and Aironet Access Points
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved