NVD Vulnerability Detail
Search Exploit, PoC
CVE-2018-0247
Summary

A vulnerability in Web Authentication (WebAuth) clients for the Cisco Wireless LAN Controller (WLC) and Aironet Access Points running Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic. The vulnerability is due to incorrect implementation of authentication for WebAuth clients in a specific configuration. An attacker could exploit this vulnerability by sending traffic to local network resources without having gone through authentication. A successful exploit could allow the attacker to bypass authentication and pass traffic. This affects Cisco Aironet Access Points running Cisco IOS Software and Cisco Wireless LAN Controller (WLC) releases prior to 8.5.110.0 for the following specific WLC configuration only: (1) The Access Point (AP) is configured in FlexConnect Mode with NAT. (2) The WLAN is configured for central switching, meaning the client is being assigned a unique IP address. (3) The AP is configured with a Split Tunnel access control list (ACL) for access to local network resources, meaning the AP is doing the NAT on the connection. (4) The client is using WebAuth. This vulnerability does not apply to .1x clients in the same configuration. Cisco Bug IDs: CSCvc79502, CSCvf71789.

Publication Date May 3, 2018, 7:29 a.m.
Registration Date March 1, 2021, 6:36 p.m.
Last Update Nov. 21, 2024, 12:37 p.m.
CVSS3.0 : MEDIUM
スコア 4.7
Vector CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
攻撃元区分(AV) 隣接
攻撃条件の複雑さ(AC)
攻撃に必要な特権レベル(PR) 不要
利用者の関与(UI) 不要
影響の想定範囲(S) 変更あり
機密性への影響(C) なし
完全性への影響(I)
可用性への影響(A) なし
CVSS2.0 : LOW
Score 3.3
Vector AV:A/AC:L/Au:N/C:N/I:P/A:N
攻撃元区分(AV) 隣接
攻撃条件の複雑さ(AC)
攻撃前の認証要否(Au) 不要
機密性への影響(C) なし
完全性への影響(I)
可用性への影響(A) なし
Get all privileges. いいえ
Get user privileges いいえ
Get other privileges いいえ
User operation required いいえ
Affected software configurations
Configuration1 or higher or less more than less than
cpe:2.3:o:cisco:wireless_lan_controller_software:8.3\(104.105\):*:*:*:*:*:*:*
Configuration2 or higher or less more than less than
cpe:2.3:o:cisco:aironet_access_point_software:8.3\(104.105\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:aironet_access_point_software:8.5\(107.52\):*:*:*:*:*:*:*
Related information, measures and tools
Common Vulnerabilities List

JVN Vulnerability Information
Cisco Wireless LAN Controller および Aironet Access Point における認証に関する脆弱性
Title Cisco Wireless LAN Controller および Aironet Access Point における認証に関する脆弱性
Summary

Cisco Wireless LAN Controller (WLC) および Aironet Access Point には、認証に関する脆弱性が存在します。 ベンダは、本脆弱性を Bug ID CSCvc79502 および CSCvf71789 として公開しています。

Possible impacts 情報を改ざんされる可能性があります。
Solution

ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。

Publication Date May 2, 2018, midnight
Registration Date June 29, 2018, 5:44 p.m.
Last Update June 29, 2018, 5:44 p.m.
Affected System
シスコシステムズ
Cisco Aironet アクセス ポイント ソフトウェア 
Cisco Wireless LAN Controller ソフトウェア 
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
Change Log
No Changed Details Date of change
1 [2018年06月29日]
  掲載
June 29, 2018, 5:44 p.m.