SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Device (Router/Bridge/Hub)  >   Cisco Aironet Vendors:   Cisco
Cisco Aironet FlexConnect Access Points Central Web Authentication Flaw Lets Remote Authenticated Users Bypass ACLs on the Target System
SecurityTracker Alert ID:  1040818
SecurityTracker URL:  http://securitytracker.com/id/1040818
CVE Reference:   CVE-2018-0250   (Links to External Site)
Date:  May 3 2018
Impact:   Host/resource access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1560, 1810, 1810w, 1815, 1830, 1850, 2800, and 3800 Series
Description:   A vulnerability was reported in Cisco Aironet. A remote authenticated user can bypass security restrictions.

A remote authenticated user on the local network can exploit a flaw in Central Web Authentication (CWA) on FlexConnect Access Points to bypass client FlexConnect access control list (ACL) restrictions.

The vendor has assigned bug ID CSCve17756 to this vulnerability.

Impact:   A remote authenticated user on the local network can bypass client FlexConnect access control list (ACL) restrictions.
Solution:   The vendor has issued a fix.

The vendor advisory is available at:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-ap-acl

Vendor URL:  tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-ap-acl (Links to External Site)
Cause:   Access control error

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC