### [CVE-2018-15372](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15372) ![](https://img.shields.io/static/v1?label=Product&message=Cisco%20IOS%20XE%20Software&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-284&color=brighgreen) ### Description A vulnerability in the MACsec Key Agreement (MKA) using Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic through a Layer 3 interface of an affected device. The vulnerability is due to a logic error in the affected software. An attacker could exploit this vulnerability by connecting to and passing traffic through a Layer 3 interface of an affected device, if the interface is configured for MACsec MKA using EAP-TLS and is running in access-session closed mode. A successful exploit could allow the attacker to bypass 802.1x network access controls and gain access to the network. ### POC #### Reference No PoCs from references. #### Github - https://github.com/lucabrasi83/vscan