Vulnslist

find the latest Cisco vulnerabilities

Cisco Wireless LAN Controller Management Interface Authentication Bypass Vulnerability

cisco-sa-wlc-auth-bypass-JRNhV4fF · Critical · Published · Updated

A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to bypass authentication controls and log in to the device through the management interface This vulnerability is due to the improper implementation of the password validation algorithm. An attacker could exploit this vulnerability by logging in to an affected device with crafted credentials. A successful exploit could allow the attacker to bypass authentication and log in to the device as an administrator. The attacker could obtain privileges that are the same level as an administrative user but it depends on the crafted credentials. Note: This vulnerability exists because of a non-default device configuration that must be present for it to be exploitable. For details about the vulnerable configuration, see the Vulnerable Products section of this advisory. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-auth-bypass-JRNhV4fF

Workarounds

There are workarounds that addresses this vulnerability. Choose one of the following based on the environment:

Option 1: No Macfilters in the Environment

Customers who do not use macfilters can reset the macfilter radius compatibility mode to the default value using the following CLI command:

wlc > config macfilter radius-compat cisco

Option 2: Macfilters in the Environment

Customers who use macfilters and who are able to change the radius server configuration to match other possible compatibility modes can modify the macfilter compatibility to either cisco or free using one of the following CLI commands:

wlc > config macfilter radius-compat cisco
wlc > config macfilter radius-compat free

For more information about the different macfilter compatibility modes, see Cisco Wireless Controller Command Reference https://www.cisco.com/c/en/us/td/docs/wireless/controller/8-10/cmd-ref/b-cr810/config_commands_j_to_q.html#wp4097683650 .

While these workarounds have been deployed and were proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2022-20695
Cisco Bug IDsCSCwa43249
CVSS ScoreBase 10.0
Base 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco Wireless LAN Controller (WLC), Cisco Wireless LAN Controller (WLC) 8.10.162.0, Cisco Wireless LAN Controller (WLC) 8.10.151.0, Cisco 5500 Series Wireless Controllers, Cisco 3500 Series Wireless Controllers, Cisco 8500 Series Wireless Controllers, Cisco Virtual Wireless Controller

CSAF Product Statuses

Product Status Source CVE Rows
Cisco 3500 Series Wireless Controllers known_affected cisco_csaf CVE-2022-20695 2
Cisco 5500 Series Wireless Controllers known_affected cisco_csaf CVE-2022-20695 2
Cisco 8500 Series Wireless Controllers known_affected cisco_csaf CVE-2022-20695 2
Cisco Virtual Wireless Controller known_affected cisco_csaf CVE-2022-20695 2

Related Products

Product CVE Evidence
Cisco 5500 Series Wireless Controllers CVE-2022-20695 Cisco CSAF
Cisco Wireless LAN Controller (WLC) CVE-2022-20695 Cisco OpenVuln
Cisco 3500 Series Wireless Controllers CVE-2022-20695 Cisco CSAF
Cisco 8500 Series Wireless Controllers CVE-2022-20695 Cisco CSAF
Cisco Virtual Wireless Controller CVE-2022-20695 Cisco CSAF
Cisco 8500 Series Secure Routers CVE-2022-20695 Cisco OpenVuln