CVE-2018-0247 (CNNVD-201805-087)

MEDIUM
中文标题:
Cisco Wireless LAN Controller和Aironet Access Points 授权问题漏洞
英文标题:
A vulnerability in Web Authentication (WebAuth) clients for the Cisco Wireless LAN Controller (WLC) ...
CVSS分数: 4.7
发布时间: 2018-05-02 22:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco Aironet Access Points、IOS Software和Wireless LAN Controller都是美国思科(Cisco)公司的产品。Cisco Aironet Access Points和Cisco Wireless LAN Controller是一套无线访问接入点设备。IOS Software是运行在其中的一套操作系统。Wireless LAN Controller是一款无线局域网控制器产品。该产品在无线局域网中提供安全策略、入侵检测等功能。Web Authentication(WebAuth)是其中的一个Web身份验证客户端程序。 Cisco Aironet Access Points的IOS Software和Cisco Wireless LAN Controller 8.5.110.0之前版本中的WebAuth客户端存在授权问题漏洞,该漏洞源于程序没有实现身份验证。攻击者可利用该漏洞绕过身份验证,发送流量。

英文描述:

A vulnerability in Web Authentication (WebAuth) clients for the Cisco Wireless LAN Controller (WLC) and Aironet Access Points running Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic. The vulnerability is due to incorrect implementation of authentication for WebAuth clients in a specific configuration. An attacker could exploit this vulnerability by sending traffic to local network resources without having gone through authentication. A successful exploit could allow the attacker to bypass authentication and pass traffic. This affects Cisco Aironet Access Points running Cisco IOS Software and Cisco Wireless LAN Controller (WLC) releases prior to 8.5.110.0 for the following specific WLC configuration only: (1) The Access Point (AP) is configured in FlexConnect Mode with NAT. (2) The WLAN is configured for central switching, meaning the client is being assigned a unique IP address. (3) The AP is configured with a Split Tunnel access control list (ACL) for access to local network resources, meaning the AP is doing the NAT on the connection. (4) The client is using WebAuth. This vulnerability does not apply to .1x clients in the same configuration. Cisco Bug IDs: CSCvc79502, CSCvf71789.

CWE类型:
CWE-287
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
cisco wireless_lan_controller_software 8.3\(104.105\) - - cpe:2.3:o:cisco:wireless_lan_controller_software:8.3\(104.105\):*:*:*:*:*:*:*
cisco aironet_access_point_software 8.3\(104.105\) - - cpe:2.3:o:cisco:aironet_access_point_software:8.3\(104.105\):*:*:*:*:*:*:*
cisco aironet_access_point_software 8.5\(107.52\) - - cpe:2.3:o:cisco:aironet_access_point_software:8.5\(107.52\):*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
104087 vdb-entry
cve.org
访问
1040815 vdb-entry
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
1040814 vdb-entry
cve.org
访问
CVSS评分详情
4.7
MEDIUM
CVSS向量: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
CVSS版本: 3.0
机密性
NONE
完整性
LOW
可用性
NONE
时间信息
发布时间:
2018-05-02 22:00:00
修改时间:
2024-11-29 15:13:20
创建时间:
2025-11-11 15:34:56
更新时间:
2025-11-11 15:53:42
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2018-0247 2025-11-11 15:19:35 2025-11-11 07:34:56
NVD nvd_CVE-2018-0247 2025-11-11 14:55:54 2025-11-11 07:43:33
CNNVD cnnvd_CNNVD-201805-087 2025-11-11 15:10:00 2025-11-11 07:53:42
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:53:42
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-201805-087; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-201805-087
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:33
cvss_score: 未提取 → 4.7; cvss_vector: NOT_EXTRACTED → CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N; cvss_version: NOT_EXTRACTED → 3.0; affected_products_count: 0 → 3; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 4.7
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
  • cvss_version: NOT_EXTRACTED -> 3.0
  • affected_products_count: 0 -> 3
  • data_sources: ['cve'] -> ['cve', 'nvd']