Today > | 1 Medium vulnerabilities   -   You can now download lists of IOCs here!

CVE-2024-20510

Oct. 3, 2024, 2:52 p.m.

CVSS Score

9.3 / 10

Products Impacted

Vendor Product Versions
cisco
  • ios_xe
  • 16.3.1, 16.3.1a, 16.3.2, 16.3.3, 16.3.4, 16.3.5, 16.3.5b, 16.3.6, 16.3.7, 16.3.8, 16.3.9, 16.3.10, 16.3.11, 16.4.1, 16.4.2, 16.4.3, 16.5.1, 16.5.1a, 16.5.1b, 16.5.2, 16.5.3, 16.6.1, 16.6.2, 16.6.3, 16.6.4, 16.6.4a, 16.6.5, 16.6.5a, 16.6.6, 16.6.7, 16.6.8, 16.6.9, 16.6.10, 16.7.1, 16.7.1a, 16.7.1b, 16.7.2, 16.7.3, 16.7.4, 16.8.1, 16.8.1a, 16.8.1b, 16.8.1c, 16.8.1d, 16.8.1e, 16.8.1s, 16.8.2, 16.8.3, 16.9.1, 16.9.1a, 16.9.1b, 16.9.1s, 16.9.2, 16.9.3, 16.9.3a, 16.9.4, 16.9.5, 16.9.5f, 16.9.6, 16.9.7, 16.9.8, 16.10.1, 16.10.1a, 16.10.1b, 16.10.1c, 16.10.1d, 16.10.1e, 16.10.1f, 16.10.1g, 16.10.1s, 16.10.2, 16.10.3, 16.11.1, 16.11.1a, 16.11.1b, 16.11.1s, 16.11.2, 16.12.1, 16.12.1a, 16.12.1c, 16.12.1s, 16.12.1t, 16.12.1w, 16.12.1x, 16.12.1y, 16.12.1z1, 16.12.1z2, 16.12.2, 16.12.2a, 16.12.2s, 16.12.3, 16.12.3a, 16.12.3s, 16.12.4, 16.12.4a, 16.12.5, 16.12.5a, 16.12.5b, 16.12.6, 16.12.6a, 16.12.7, 16.12.8, 16.12.9, 16.12.10, 16.12.10a, 16.12.11, 17.1.1, 17.1.1a, 17.1.1s, 17.1.1t, 17.1.3, 17.2.1, 17.2.1a, 17.2.1r, 17.2.1v, 17.2.2, 17.2.3, 17.3.1, 17.3.1a, 17.3.1w, 17.3.1x, 17.3.1z, 17.3.2, 17.3.2a, 17.3.3, 17.3.4, 17.3.4a, 17.3.4b, 17.3.4c, 17.3.5, 17.3.5a, 17.3.5b, 17.3.6, 17.3.7, 17.3.8, 17.3.8a, 17.4.1, 17.4.1a, 17.4.1b, 17.4.2, 17.4.2a, 17.5.1, 17.5.1a, 17.6.1, 17.6.1a, 17.6.1w, 17.6.1x, 17.6.1y, 17.6.1z, 17.6.1z1, 17.6.2, 17.6.3, 17.6.3a, 17.6.4, 17.6.5, 17.6.5a, 17.6.6, 17.6.6a, 17.6.7, 17.7.1, 17.7.1a, 17.7.1b, 17.7.2, 17.8.1, 17.8.1a, 17.9.1, 17.9.1a, 17.9.1w, 17.9.1x, 17.9.1x1, 17.9.1y, 17.9.1y1, 17.9.2, 17.9.2a, 17.9.3, 17.9.3a, 17.9.4, 17.9.4a, 17.9.5, 17.9.5a, 17.9.5b, 17.10.1, 17.10.1a, 17.10.1b, 17.11.1, 17.11.1a, 17.11.99sw, 17.12.1, 17.12.1a, 17.12.1w, 17.12.1x, 17.12.1y, 17.12.2, 17.12.2a, 17.12.3, 17.13.1, 17.13.1a

Description

A vulnerability in the Central Web Authentication (CWA) feature of Cisco IOS XE Software for Wireless Controllers could allow an unauthenticated, adjacent attacker to bypass the pre-authentication access control list (ACL), which could allow access to network resources before user authentication. This vulnerability is due to a logic error when activating the pre-authentication ACL that is received from the authentication, authorization, and accounting (AAA) server. An attacker could exploit this vulnerability by connecting to a wireless network that is configured for CWA and sending traffic through an affected device that should be denied by the configured ACL before user authentication. A successful exploit could allow the attacker to bypass configured ACL protections on the affected device before the user authentication is completed, allowing the attacker to access trusted networks that the device might be protecting.

Weaknesses

CWE-863
Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.

CWE ID: 863

Date

Published: Sept. 25, 2024, 5:15 p.m.

Last Modified: Oct. 3, 2024, 2:52 p.m.

Status : Analyzed

CVE has had analysis completed and all data associations made.

More info

Source

ykramarz@cisco.com

CPEs

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o cisco ios_xe 16.3.1 / / / / / / /
o cisco ios_xe 16.3.1a / / / / / / /
o cisco ios_xe 16.3.2 / / / / / / /
o cisco ios_xe 16.3.3 / / / / / / /
o cisco ios_xe 16.3.4 / / / / / / /
o cisco ios_xe 16.3.5 / / / / / / /
o cisco ios_xe 16.3.5b / / / / / / /
o cisco ios_xe 16.3.6 / / / / / / /
o cisco ios_xe 16.3.7 / / / / / / /
o cisco ios_xe 16.3.8 / / / / / / /
o cisco ios_xe 16.3.9 / / / / / / /
o cisco ios_xe 16.3.10 / / / / / / /
o cisco ios_xe 16.3.11 / / / / / / /
o cisco ios_xe 16.4.1 / / / / / / /
o cisco ios_xe 16.4.2 / / / / / / /
o cisco ios_xe 16.4.3 / / / / / / /
o cisco ios_xe 16.5.1 / / / / / / /
o cisco ios_xe 16.5.1a / / / / / / /
o cisco ios_xe 16.5.1b / / / / / / /
o cisco ios_xe 16.5.2 / / / / / / /
o cisco ios_xe 16.5.3 / / / / / / /
o cisco ios_xe 16.6.1 / / / / / / /
o cisco ios_xe 16.6.2 / / / / / / /
o cisco ios_xe 16.6.3 / / / / / / /
o cisco ios_xe 16.6.4 / / / / / / /
o cisco ios_xe 16.6.4a / / / / / / /
o cisco ios_xe 16.6.5 / / / / / / /
o cisco ios_xe 16.6.5a / / / / / / /
o cisco ios_xe 16.6.6 / / / / / / /
o cisco ios_xe 16.6.7 / / / / / / /
o cisco ios_xe 16.6.8 / / / / / / /
o cisco ios_xe 16.6.9 / / / / / / /
o cisco ios_xe 16.6.10 / / / / / / /
o cisco ios_xe 16.7.1 / / / / / / /
o cisco ios_xe 16.7.1a / / / / / / /
o cisco ios_xe 16.7.1b / / / / / / /
o cisco ios_xe 16.7.2 / / / / / / /
o cisco ios_xe 16.7.3 / / / / / / /
o cisco ios_xe 16.7.4 / / / / / / /
o cisco ios_xe 16.8.1 / / / / / / /
o cisco ios_xe 16.8.1a / / / / / / /
o cisco ios_xe 16.8.1b / / / / / / /
o cisco ios_xe 16.8.1c / / / / / / /
o cisco ios_xe 16.8.1d / / / / / / /
o cisco ios_xe 16.8.1e / / / / / / /
o cisco ios_xe 16.8.1s / / / / / / /
o cisco ios_xe 16.8.2 / / / / / / /
o cisco ios_xe 16.8.3 / / / / / / /
o cisco ios_xe 16.9.1 / / / / / / /
o cisco ios_xe 16.9.1a / / / / / / /
o cisco ios_xe 16.9.1b / / / / / / /
o cisco ios_xe 16.9.1s / / / / / / /
o cisco ios_xe 16.9.2 / / / / / / /
o cisco ios_xe 16.9.3 / / / / / / /
o cisco ios_xe 16.9.3a / / / / / / /
o cisco ios_xe 16.9.4 / / / / / / /
o cisco ios_xe 16.9.5 / / / / / / /
o cisco ios_xe 16.9.5f / / / / / / /
o cisco ios_xe 16.9.6 / / / / / / /
o cisco ios_xe 16.9.7 / / / / / / /
o cisco ios_xe 16.9.8 / / / / / / /
o cisco ios_xe 16.10.1 / / / / / / /
o cisco ios_xe 16.10.1a / / / / / / /
o cisco ios_xe 16.10.1b / / / / / / /
o cisco ios_xe 16.10.1c / / / / / / /
o cisco ios_xe 16.10.1d / / / / / / /
o cisco ios_xe 16.10.1e / / / / / / /
o cisco ios_xe 16.10.1f / / / / / / /
o cisco ios_xe 16.10.1g / / / / / / /
o cisco ios_xe 16.10.1s / / / / / / /
o cisco ios_xe 16.10.2 / / / / / / /
o cisco ios_xe 16.10.3 / / / / / / /
o cisco ios_xe 16.11.1 / / / / / / /
o cisco ios_xe 16.11.1a / / / / / / /
o cisco ios_xe 16.11.1b / / / / / / /
o cisco ios_xe 16.11.1s / / / / / / /
o cisco ios_xe 16.11.2 / / / / / / /
o cisco ios_xe 16.12.1 / / / / / / /
o cisco ios_xe 16.12.1a / / / / / / /
o cisco ios_xe 16.12.1c / / / / / / /
o cisco ios_xe 16.12.1s / / / / / / /
o cisco ios_xe 16.12.1t / / / / / / /
o cisco ios_xe 16.12.1w / / / / / / /
o cisco ios_xe 16.12.1x / / / / / / /
o cisco ios_xe 16.12.1y / / / / / / /
o cisco ios_xe 16.12.1z1 / / / / / / /
o cisco ios_xe 16.12.1z2 / / / / / / /
o cisco ios_xe 16.12.2 / / / / / / /
o cisco ios_xe 16.12.2a / / / / / / /
o cisco ios_xe 16.12.2s / / / / / / /
o cisco ios_xe 16.12.3 / / / / / / /
o cisco ios_xe 16.12.3a / / / / / / /
o cisco ios_xe 16.12.3s / / / / / / /
o cisco ios_xe 16.12.4 / / / / / / /
o cisco ios_xe 16.12.4a / / / / / / /
o cisco ios_xe 16.12.5 / / / / / / /
o cisco ios_xe 16.12.5a / / / / / / /
o cisco ios_xe 16.12.5b / / / / / / /
o cisco ios_xe 16.12.6 / / / / / / /
o cisco ios_xe 16.12.6a / / / / / / /
o cisco ios_xe 16.12.7 / / / / / / /
o cisco ios_xe 16.12.8 / / / / / / /
o cisco ios_xe 16.12.9 / / / / / / /
o cisco ios_xe 16.12.10 / / / / / / /
o cisco ios_xe 16.12.10a / / / / / / /
o cisco ios_xe 16.12.11 / / / / / / /
o cisco ios_xe 17.1.1 / / / / / / /
o cisco ios_xe 17.1.1a / / / / / / /
o cisco ios_xe 17.1.1s / / / / / / /
o cisco ios_xe 17.1.1t / / / / / / /
o cisco ios_xe 17.1.3 / / / / / / /
o cisco ios_xe 17.2.1 / / / / / / /
o cisco ios_xe 17.2.1a / / / / / / /
o cisco ios_xe 17.2.1r / / / / / / /
o cisco ios_xe 17.2.1v / / / / / / /
o cisco ios_xe 17.2.2 / / / / / / /
o cisco ios_xe 17.2.3 / / / / / / /
o cisco ios_xe 17.3.1 / / / / / / /
o cisco ios_xe 17.3.1a / / / / / / /
o cisco ios_xe 17.3.1w / / / / / / /
o cisco ios_xe 17.3.1x / / / / / / /
o cisco ios_xe 17.3.1z / / / / / / /
o cisco ios_xe 17.3.2 / / / / / / /
o cisco ios_xe 17.3.2a / / / / / / /
o cisco ios_xe 17.3.3 / / / / / / /
o cisco ios_xe 17.3.4 / / / / / / /
o cisco ios_xe 17.3.4a / / / / / / /
o cisco ios_xe 17.3.4b / / / / / / /
o cisco ios_xe 17.3.4c / / / / / / /
o cisco ios_xe 17.3.5 / / / / / / /
o cisco ios_xe 17.3.5a / / / / / / /
o cisco ios_xe 17.3.5b / / / / / / /
o cisco ios_xe 17.3.6 / / / / / / /
o cisco ios_xe 17.3.7 / / / / / / /
o cisco ios_xe 17.3.8 / / / / / / /
o cisco ios_xe 17.3.8a / / / / / / /
o cisco ios_xe 17.4.1 / / / / / / /
o cisco ios_xe 17.4.1a / / / / / / /
o cisco ios_xe 17.4.1b / / / / / / /
o cisco ios_xe 17.4.2 / / / / / / /
o cisco ios_xe 17.4.2a / / / / / / /
o cisco ios_xe 17.5.1 / / / / / / /
o cisco ios_xe 17.5.1a / / / / / / /
o cisco ios_xe 17.6.1 / / / / / / /
o cisco ios_xe 17.6.1a / / / / / / /
o cisco ios_xe 17.6.1w / / / / / / /
o cisco ios_xe 17.6.1x / / / / / / /
o cisco ios_xe 17.6.1y / / / / / / /
o cisco ios_xe 17.6.1z / / / / / / /
o cisco ios_xe 17.6.1z1 / / / / / / /
o cisco ios_xe 17.6.2 / / / / / / /
o cisco ios_xe 17.6.3 / / / / / / /
o cisco ios_xe 17.6.3a / / / / / / /
o cisco ios_xe 17.6.4 / / / / / / /
o cisco ios_xe 17.6.5 / / / / / / /
o cisco ios_xe 17.6.5a / / / / / / /
o cisco ios_xe 17.6.6 / / / / / / /
o cisco ios_xe 17.6.6a / / / / / / /
o cisco ios_xe 17.6.7 / / / / / / /
o cisco ios_xe 17.7.1 / / / / / / /
o cisco ios_xe 17.7.1a / / / / / / /
o cisco ios_xe 17.7.1b / / / / / / /
o cisco ios_xe 17.7.2 / / / / / / /
o cisco ios_xe 17.8.1 / / / / / / /
o cisco ios_xe 17.8.1a / / / / / / /
o cisco ios_xe 17.9.1 / / / / / / /
o cisco ios_xe 17.9.1a / / / / / / /
o cisco ios_xe 17.9.1w / / / / / / /
o cisco ios_xe 17.9.1x / / / / / / /
o cisco ios_xe 17.9.1x1 / / / / / / /
o cisco ios_xe 17.9.1y / / / / / / /
o cisco ios_xe 17.9.1y1 / / / / / / /
o cisco ios_xe 17.9.2 / / / / / / /
o cisco ios_xe 17.9.2a / / / / / / /
o cisco ios_xe 17.9.3 / / / / / / /
o cisco ios_xe 17.9.3a / / / / / / /
o cisco ios_xe 17.9.4 / / / / / / /
o cisco ios_xe 17.9.4a / / / / / / /
o cisco ios_xe 17.9.5 / / / / / / /
o cisco ios_xe 17.9.5a / / / / / / /
o cisco ios_xe 17.9.5b / / / / / / /
o cisco ios_xe 17.10.1 / / / / / / /
o cisco ios_xe 17.10.1a / / / / / / /
o cisco ios_xe 17.10.1b / / / / / / /
o cisco ios_xe 17.11.1 / / / / / / /
o cisco ios_xe 17.11.1a / / / / / / /
o cisco ios_xe 17.11.99sw / / / / / / /
o cisco ios_xe 17.12.1 / / / / / / /
o cisco ios_xe 17.12.1a / / / / / / /
o cisco ios_xe 17.12.1w / / / / / / /
o cisco ios_xe 17.12.1x / / / / / / /
o cisco ios_xe 17.12.1y / / / / / / /
o cisco ios_xe 17.12.2 / / / / / / /
o cisco ios_xe 17.12.2a / / / / / / /
o cisco ios_xe 17.12.3 / / / / / / /
o cisco ios_xe 17.13.1 / / / / / / /
o cisco ios_xe 17.13.1a / / / / / / /

CVSS Data

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Privileges Required

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

Base Score
9.3
Exploitability Score
2.8
Impact Score
5.8
Base Severity
CRITICAL
CVSS Vector String

The CVSS vector string provides an in-depth view of the vulnerability metrics.

View Vector String

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N

References