CNVD-2018-14568
Vulnerability from cnvd - Published: 2018-08-02
VLAI Severity ?
Title
多款Cisco设备Central Web Authentication ACL绕过漏洞
Description
Cisco Aironet 1560 Series Access Points等都是美国思科(Cisco)公司的不同系列的无线接入点设备。Central Web Authentication(CWA)with FlexConnect Access Points(APs)是其中的一个使用无线接入点配置中央Web身份验证的组件。
多款Cisco产品中的使用APs的CWA存在安全漏洞。攻击者可通过连接目标设备利用该漏洞绕过已配置的FlexConnect访问列表限制。
Severity
低
Patch Name
多款Cisco设备Central Web Authentication ACL绕过漏洞的补丁
Patch Description
Cisco Aironet 1560 Series Access Points等都是美国思科(Cisco)公司的不同系列的无线接入点设备。Central Web Authentication(CWA)with FlexConnect Access Points(APs)是其中的一个使用无线接入点配置中央Web身份验证的组件。
多款Cisco产品中的使用APs的CWA存在安全漏洞。攻击者可通过连接目标设备利用该漏洞绕过已配置的FlexConnect访问列表限制。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-ap-acl
Reference
https://nvd.nist.gov/vuln/detail/CVE-2018-0250
Impacted products
| Name | ['Cisco Aironet 3800 Series Access Point', 'Cisco Aironet 2800 Series Access Points', 'Cisco Aironet 1560 Series Access Points', 'Cisco Aironet 1810 Series OfficeExtend Access Points', 'Cisco Aironet 1810w Series Access Points', 'Cisco Aironet 1815 Series Access Points', 'Cisco Aironet 1830 Series Access Points', 'Cisco Aironet 1850 Series Access Points'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-0250",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=CVE-2018-0250"
}
},
"description": "Cisco Aironet 1560 Series Access Points\u7b49\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e0d\u540c\u7cfb\u5217\u7684\u65e0\u7ebf\u63a5\u5165\u70b9\u8bbe\u5907\u3002Central Web Authentication\uff08CWA\uff09with FlexConnect Access Points\uff08APs\uff09\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4f7f\u7528\u65e0\u7ebf\u63a5\u5165\u70b9\u914d\u7f6e\u4e2d\u592eWeb\u8eab\u4efd\u9a8c\u8bc1\u7684\u7ec4\u4ef6\u3002\r\n\r\n\u591a\u6b3eCisco\u4ea7\u54c1\u4e2d\u7684\u4f7f\u7528APs\u7684CWA\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8fde\u63a5\u76ee\u6807\u8bbe\u5907\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u5df2\u914d\u7f6e\u7684FlexConnect\u8bbf\u95ee\u5217\u8868\u9650\u5236\u3002",
"discovererName": "Cisco",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-ap-acl",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-14568",
"openTime": "2018-08-02",
"patchDescription": "Cisco Aironet 1560 Series Access Points\u7b49\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e0d\u540c\u7cfb\u5217\u7684\u65e0\u7ebf\u63a5\u5165\u70b9\u8bbe\u5907\u3002Central Web Authentication\uff08CWA\uff09with FlexConnect Access Points\uff08APs\uff09\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u4f7f\u7528\u65e0\u7ebf\u63a5\u5165\u70b9\u914d\u7f6e\u4e2d\u592eWeb\u8eab\u4efd\u9a8c\u8bc1\u7684\u7ec4\u4ef6\u3002\r\n\r\n\u591a\u6b3eCisco\u4ea7\u54c1\u4e2d\u7684\u4f7f\u7528APs\u7684CWA\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u8fde\u63a5\u76ee\u6807\u8bbe\u5907\u5229\u7528\u8be5\u6f0f\u6d1e\u7ed5\u8fc7\u5df2\u914d\u7f6e\u7684FlexConnect\u8bbf\u95ee\u5217\u8868\u9650\u5236\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "\u591a\u6b3eCisco\u8bbe\u5907Central Web Authentication ACL\u7ed5\u8fc7\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Cisco Aironet 3800 Series Access Point",
"Cisco Aironet 2800 Series Access Points",
"Cisco Aironet 1560 Series Access Points",
"Cisco Aironet 1810 Series OfficeExtend Access Points",
"Cisco Aironet 1810w Series Access Points",
"Cisco Aironet 1815 Series Access Points",
"Cisco Aironet 1830 Series Access Points",
"Cisco Aironet 1850 Series Access Points"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-0250",
"serverity": "\u4f4e",
"submitTime": "2018-06-13",
"title": "\u591a\u6b3eCisco\u8bbe\u5907Central Web Authentication ACL\u7ed5\u8fc7\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…