A vulnerability in the social login configuration option for the guest users of Cisco Business Wireless Access Points (APs) could allow an unauthenticated, adjacent malicious user to bypass social login authentication. This vulnerability is due to a logic error with the social login implementation. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the malicious user to access the Guest Portal without authentication.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco business_140ac_access_point_firmware |
||
cisco business_141acm_firmware |
||
cisco business_142acm_firmware |
||
cisco business_143acm_firmware |
||
cisco business_151axm_firmware 10.4.2 |
||
cisco business_145ac_access_point_firmware |
||
cisco business_150ax_access_point_firmware 10.4.2 |
||
cisco business_240ac_access_point_firmware |