2023-05-18 04:00:38 +00:00
{
"id" : "CVE-2023-20003" ,
"sourceIdentifier" : "ykramarz@cisco.com" ,
"published" : "2023-05-18T03:15:09.477" ,
2023-11-07 21:03:21 +00:00
"lastModified" : "2023-11-07T04:05:41.743" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-05-18 04:00:38 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A vulnerability in the social login configuration option for the guest users of Cisco Business Wireless Access Points (APs) could allow an unauthenticated, adjacent attacker to bypass social login authentication. This vulnerability is due to a logic error with the social login implementation. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the Guest Portal without authentication."
}
] ,
"metrics" : {
2023-05-26 04:00:30 +00:00
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
2023-11-07 21:03:21 +00:00
} ,
2023-05-18 04:00:38 +00:00
{
2024-04-04 08:46:00 +00:00
"source" : "ykramarz@cisco.com" ,
2023-05-18 04:00:38 +00:00
"type" : "Secondary" ,
"cvssData" : {
2023-11-07 21:03:21 +00:00
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N" ,
2023-05-18 04:00:38 +00:00
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 4.7 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 1.4
}
]
} ,
"weaknesses" : [
2023-05-26 04:00:30 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-306"
}
]
} ,
2023-05-18 04:00:38 +00:00
{
2024-04-04 08:46:00 +00:00
"source" : "ykramarz@cisco.com" ,
2023-05-18 04:00:38 +00:00
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-288"
}
]
}
] ,
2023-05-26 04:00:30 +00:00
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:business_140ac_access_point_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.8.1.0" ,
"matchCriteriaId" : "89879868-DE12-495F-BB7D-BD2F49DC98BC"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:business_140ac_access_point:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5781CAA5-2DB2-4724-A08E-D74A7DBBDB75"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:business_141acm_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.8.1.0" ,
"matchCriteriaId" : "5E769285-4B44-4089-AA79-13C96A4D482C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:business_141acm:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A730910D-5C14-477A-BB73-B28B87CCC48D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:business_142acm_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.8.1.0" ,
"matchCriteriaId" : "1579F8FF-E664-4AF8-8BF3-1688CDF1F1BD"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:business_142acm:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2DC1D86-30FB-46D3-93B3-452E3A4871E1"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:business_143acm_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.8.1.0" ,
"matchCriteriaId" : "3D900D1C-408E-43BE-908B-D1DA57C36728"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:business_143acm:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A9EFC167-CC69-4777-9039-2DCF61C8101A"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:business_151axm_firmware:10.4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EDBAE3F9-3874-44D4-9FCB-C581C0C194D4"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:business_151axm:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8760865B-4AB3-4A1A-960D-FF6974A7AC06"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:business_145ac_access_point_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.8.1.0" ,
"matchCriteriaId" : "A0836638-DD84-4797-9DBC-66C8CE508308"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:business_145ac_access_point:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FA1FC172-7E73-475E-8E16-3FDC12FB5FC7"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:business_150ax_access_point_firmware:10.4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F92F4E0E-C063-4157-8E63-6C1895FA82BD"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:business_150ax_access_point:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CAE3E5E5-BC8D-42A5-89C5-6FEC0E581E7C"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:business_240ac_access_point_firmware:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "10.8.1.0" ,
"matchCriteriaId" : "FFE6116E-42BD-462D-B436-1E3E10947D83"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:business_240ac_access_point:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4864663A-ADFD-4C19-84E2-F3B54F2813F3"
}
]
}
]
}
] ,
2023-05-18 04:00:38 +00:00
"references" : [
{
"url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cbw-auth-bypass-ggnAfdZ" ,
2023-05-26 04:00:30 +00:00
"source" : "ykramarz@cisco.com" ,
"tags" : [
"Vendor Advisory"
]
2023-05-18 04:00:38 +00:00
}
]
}