A vulnerability in the social login configuration option for the guest users of Cisco Business Wireless Access Points (APs) could allow an unauthenticated, adjacent attacker to bypass social login authentication. This vulnerability is due to a logic error with the social login implementation. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the Guest Portal without authentication.
References
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
Configuration 8 (hide)
AND |
|
History
21 Nov 2024, 07:40
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.7 |
References | () https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbw-auth-bypass-ggnAfdZ - Vendor Advisory |
26 May 2023, 02:37
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-306 | |
CPE | cpe:2.3:h:cisco:business_143acm:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:business_141acm:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:business_151axm:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:business_140ac_access_point:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:business_142acm_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:business_240ac_access_point_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:business_145ac_access_point_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:business_143acm_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:cisco:business_240ac_access_point:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:business_150ax_access_point_firmware:10.4.2:*:*:*:*:*:*:* cpe:2.3:o:cisco:business_141acm_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:cisco:business_151axm_firmware:10.4.2:*:*:*:*:*:*:* cpe:2.3:h:cisco:business_145ac_access_point:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:business_150ax_access_point:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:business_142acm:-:*:*:*:*:*:*:* cpe:2.3:o:cisco:business_140ac_access_point_firmware:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | (CISCO) https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbw-auth-bypass-ggnAfdZ - Vendor Advisory | |
First Time |
Cisco business 141acm
Cisco business 151axm Firmware Cisco business 140ac Access Point Cisco business 143acm Firmware Cisco business 145ac Access Point Cisco business 142acm Firmware Cisco business 145ac Access Point Firmware Cisco business 240ac Access Point Cisco business 150ax Access Point Firmware Cisco business 140ac Access Point Firmware Cisco business 150ax Access Point Cisco business 240ac Access Point Firmware Cisco business 151axm Cisco business 143acm Cisco Cisco business 141acm Firmware Cisco business 142acm |
18 May 2023, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-05-18 03:15
Updated : 2024-11-21 07:40
NVD link : CVE-2023-20003
Mitre link : CVE-2023-20003
CVE.ORG link : CVE-2023-20003
JSON object : View
Products Affected
cisco
- business_143acm
- business_143acm_firmware
- business_151axm_firmware
- business_145ac_access_point_firmware
- business_141acm_firmware
- business_140ac_access_point
- business_142acm_firmware
- business_150ax_access_point
- business_240ac_access_point_firmware
- business_142acm
- business_140ac_access_point_firmware
- business_150ax_access_point_firmware
- business_141acm
- business_151axm
- business_145ac_access_point
- business_240ac_access_point