8.8
CVE-2023-20003
- EPSS 0.02%
- Published 18.05.2023 03:15:09
- Last modified 21.11.2024 07:40:19
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the social login configuration option for the guest users of Cisco Business Wireless Access Points (APs) could allow an unauthenticated, adjacent attacker to bypass social login authentication. This vulnerability is due to a logic error with the social login implementation. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the Guest Portal without authentication.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Business 140ac Access Point Firmware Version < 10.8.1.0
Cisco ≫ Business 141acm Firmware Version < 10.8.1.0
Cisco ≫ Business 142acm Firmware Version < 10.8.1.0
Cisco ≫ Business 143acm Firmware Version < 10.8.1.0
Cisco ≫ Business 151axm Firmware Version10.4.2
Cisco ≫ Business 145ac Access Point Firmware Version < 10.8.1.0
Cisco ≫ Business 150ax Access Point Firmware Version10.4.2
Cisco ≫ Business 240ac Access Point Firmware Version < 10.8.1.0
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.016 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
psirt@cisco.com | 4.7 | 2.8 | 1.4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
|
CWE-288 Authentication Bypass Using an Alternate Path or Channel
The product requires authentication, but the product has an alternate path or channel that does not require authentication.
CWE-306 Missing Authentication for Critical Function
The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.