EAPOL Encryption Downgrade Vulnerability in Cisco Small Business Wireless Access Points
CVE-2018-0412

5.3MEDIUM

Summary

A security issue in the Extensible Authentication Protocol over LAN (EAPOL) implementation of Cisco's Small Business 100 and 300 Series Wireless Access Points allows an unauthenticated adjacent attacker to force a downgrade of the encryption algorithm used during the Wi-Fi handshake. By exploiting improper processing of EAPOL messages, an attacker can manipulate the communication between the access point and a Wi-Fi client, potentially shifting from the secure AES-CCMP cipher to the less secure WPA-TKIP cipher. This exposure may facilitate cryptographic attacks that could compromise confidential information.

Affected Version(s)

Small Business 100 Series Wireless Access Points = unspecified

Small Business 300 Series Wireless Access Points = unspecified

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.