Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2019-1758

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-28 Mar, 2019 | 00:20
Updated At-21 Nov, 2024 | 19:41
Rejected At-
Credits

Cisco IOS Software Catalyst 6500 Series 802.1x Authentication Bypass Vulnerability

A vulnerability in 802.1x function of Cisco IOS Software on the Catalyst 6500 Series Switches could allow an unauthenticated, adjacent attacker to access the network prior to authentication. The vulnerability is due to how the 802.1x packets are handled in the process path. An attacker could exploit this vulnerability by attempting to connect to the network on an 802.1x configured port. A successful exploit could allow the attacker to intermittently obtain access to the network.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:28 Mar, 2019 | 00:20
Updated At:21 Nov, 2024 | 19:41
Rejected At:
â–¼CVE Numbering Authority (CNA)
Cisco IOS Software Catalyst 6500 Series 802.1x Authentication Bypass Vulnerability

A vulnerability in 802.1x function of Cisco IOS Software on the Catalyst 6500 Series Switches could allow an unauthenticated, adjacent attacker to access the network prior to authentication. The vulnerability is due to how the 802.1x packets are handled in the process path. An attacker could exploit this vulnerability by attempting to connect to the network on an 802.1x configured port. A successful exploit could allow the attacker to intermittently obtain access to the network.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco IOS Software
Versions
Affected
  • 12.2(60)EZ12
Problem Types
TypeCWE IDDescription
CWECWE-287CWE-287
Type: CWE
CWE ID: CWE-287
Description: CWE-287
Metrics
VersionBase scoreBase severityVector
3.04.7MEDIUM
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Version: 3.0
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-c6500
vendor-advisory
x_refsource_CISCO
http://www.securityfocus.com/bid/107616
vdb-entry
x_refsource_BID
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-c6500
Resource:
vendor-advisory
x_refsource_CISCO
Hyperlink: http://www.securityfocus.com/bid/107616
Resource:
vdb-entry
x_refsource_BID
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-c6500
vendor-advisory
x_refsource_CISCO
x_transferred
http://www.securityfocus.com/bid/107616
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-c6500
Resource:
vendor-advisory
x_refsource_CISCO
x_transferred
Hyperlink: http://www.securityfocus.com/bid/107616
Resource:
vdb-entry
x_refsource_BID
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ykramarz@cisco.com
Published At:28 Mar, 2019 | 01:29
Updated At:09 Oct, 2019 | 23:47

A vulnerability in 802.1x function of Cisco IOS Software on the Catalyst 6500 Series Switches could allow an unauthenticated, adjacent attacker to access the network prior to authentication. The vulnerability is due to how the 802.1x packets are handled in the process path. An attacker could exploit this vulnerability by attempting to connect to the network on an 802.1x configured port. A successful exploit could allow the attacker to intermittently obtain access to the network.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.04.3MEDIUM
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Secondary3.04.7MEDIUM
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Primary2.03.3LOW
AV:A/AC:L/Au:N/C:N/I:P/A:N
Type: Primary
Version: 3.0
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Type: Secondary
Version: 3.0
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Type: Primary
Version: 2.0
Base score: 3.3
Base severity: LOW
Vector:
AV:A/AC:L/Au:N/C:N/I:P/A:N
CPE Matches

Cisco Systems, Inc.
cisco
>>ios>>12.2\(33\)sxj6
cpe:2.3:o:cisco:ios:12.2\(33\)sxj6:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.2\(33\)sxj7
cpe:2.3:o:cisco:ios:12.2\(33\)sxj7:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.2\(33\)sxj8
cpe:2.3:o:cisco:ios:12.2\(33\)sxj8:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.2\(33\)sxj9
cpe:2.3:o:cisco:ios:12.2\(33\)sxj9:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.2\(33\)sxj10
cpe:2.3:o:cisco:ios:12.2\(33\)sxj10:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>12.2\(60\)ez12
cpe:2.3:o:cisco:ios:12.2\(60\)ez12:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(1\)sy1
cpe:2.3:o:cisco:ios:15.1\(1\)sy1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(1\)sy2
cpe:2.3:o:cisco:ios:15.1\(1\)sy2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(1\)sy3
cpe:2.3:o:cisco:ios:15.1\(1\)sy3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(1\)sy4
cpe:2.3:o:cisco:ios:15.1\(1\)sy4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(1\)sy5
cpe:2.3:o:cisco:ios:15.1\(1\)sy5:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(1\)sy6
cpe:2.3:o:cisco:ios:15.1\(1\)sy6:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sg8a
cpe:2.3:o:cisco:ios:15.1\(2\)sg8a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy
cpe:2.3:o:cisco:ios:15.1\(2\)sy:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy1
cpe:2.3:o:cisco:ios:15.1\(2\)sy1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy2
cpe:2.3:o:cisco:ios:15.1\(2\)sy2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy3
cpe:2.3:o:cisco:ios:15.1\(2\)sy3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy4
cpe:2.3:o:cisco:ios:15.1\(2\)sy4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy4a
cpe:2.3:o:cisco:ios:15.1\(2\)sy4a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy5
cpe:2.3:o:cisco:ios:15.1\(2\)sy5:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy6
cpe:2.3:o:cisco:ios:15.1\(2\)sy6:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy7
cpe:2.3:o:cisco:ios:15.1\(2\)sy7:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy8
cpe:2.3:o:cisco:ios:15.1\(2\)sy8:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy9
cpe:2.3:o:cisco:ios:15.1\(2\)sy9:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy10
cpe:2.3:o:cisco:ios:15.1\(2\)sy10:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy11
cpe:2.3:o:cisco:ios:15.1\(2\)sy11:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy12
cpe:2.3:o:cisco:ios:15.1\(2\)sy12:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(2\)sy13
cpe:2.3:o:cisco:ios:15.1\(2\)sy13:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(3\)svg3d
cpe:2.3:o:cisco:ios:15.1\(3\)svg3d:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(3\)svi1b
cpe:2.3:o:cisco:ios:15.1\(3\)svi1b:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(3\)svk4b
cpe:2.3:o:cisco:ios:15.1\(3\)svk4b:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(3\)svk4c
cpe:2.3:o:cisco:ios:15.1\(3\)svk4c:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(3\)svm3
cpe:2.3:o:cisco:ios:15.1\(3\)svm3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(3\)svn2
cpe:2.3:o:cisco:ios:15.1\(3\)svn2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(3\)svo1
cpe:2.3:o:cisco:ios:15.1\(3\)svo1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(3\)svo2
cpe:2.3:o:cisco:ios:15.1\(3\)svo2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(3\)svp1
cpe:2.3:o:cisco:ios:15.1\(3\)svp1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(3\)svp2
cpe:2.3:o:cisco:ios:15.1\(3\)svp2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.1\(4\)m12c
cpe:2.3:o:cisco:ios:15.1\(4\)m12c:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.2\(1\)sy
cpe:2.3:o:cisco:ios:15.2\(1\)sy:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.2\(1\)sy0a
cpe:2.3:o:cisco:ios:15.2\(1\)sy0a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.2\(1\)sy1
cpe:2.3:o:cisco:ios:15.2\(1\)sy1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.2\(1\)sy1a
cpe:2.3:o:cisco:ios:15.2\(1\)sy1a:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.2\(1\)sy2
cpe:2.3:o:cisco:ios:15.2\(1\)sy2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.2\(1\)sy3
cpe:2.3:o:cisco:ios:15.2\(1\)sy3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.2\(1\)sy4
cpe:2.3:o:cisco:ios:15.2\(1\)sy4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.2\(1\)sy5
cpe:2.3:o:cisco:ios:15.2\(1\)sy5:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.2\(1\)sy6
cpe:2.3:o:cisco:ios:15.2\(1\)sy6:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.2\(1\)sy7
cpe:2.3:o:cisco:ios:15.2\(1\)sy7:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios>>15.2\(2\)sy
cpe:2.3:o:cisco:ios:15.2\(2\)sy:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Primarynvd@nist.gov
CWE-287Secondaryykramarz@cisco.com
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-287
Type: Secondary
Source: ykramarz@cisco.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/107616ykramarz@cisco.com
Third Party Advisory
VDB Entry
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-c6500ykramarz@cisco.com
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/107616
Source: ykramarz@cisco.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-c6500
Source: ykramarz@cisco.com
Resource:
Patch
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

202Records found

CVE-2018-0163
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.18% / 39.75%
||
7 Day CHG~0.00%
Published-28 Mar, 2018 | 22:00
Updated-02 Dec, 2024 | 20:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the 802.1x multiple-authentication (multi-auth) feature of Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass the authentication phase on an 802.1x multi-auth port. The vulnerability is due to a logic change error introduced into the code. An attacker could exploit this vulnerability by trying to access an 802.1x multi-auth port after a successful supplicant has authenticated. An exploit could allow the attacker to bypass the 802.1x access controls and obtain access to the network. Cisco Bug IDs: CSCvg69701.

Action-Not Available
Vendor-n/aRockwell Automation, Inc.Cisco Systems, Inc.
Product-5921_embedded_services_router819_hardened_3g1905_serial_integrated_services_router887vagw_3g1240_connected_grid_routerc867vae_integrated_services_router886va-w_integrated_services_router860vae-w_integrated_services_routerc891f_integrated_services_routersc896va_integrated_services_router5940_embedded_services_router1921_integrated_services_routerc897vam-w_integrated_services_router886va_integrated_services_routerstratix_59001906c_integrated_services_router2010_connected_grid_router819_non-hardened_secure_multi-mode_4g_lte_m2m_isr_router892w_integrated_services_routerc881_integrated_services_routerc866vae_integrated_services_router809_industrial_integrated_services_router5915_embedded_service_routerc887vam_integrated_services_routersc887va_integrated_services_routers898_secure_g.shdsl_efm\/atmc888ea_integrated_services_router812_cifi_integrated_services_router886vag_3g_integrated_services_routerc899_secure_gigabit_ethernet888eg_3g_integrated_services_router881_3g_integrated_services_router2921_integrated_services_router888w_integrated_services_router897_multi-mode_vdsl2\/adsl2\+_pots_annex_m3925_integrated_services_routervg350_analog_voice_gatewayc886vaj_integrated_services_router2951_integrated_services_router888-cube_integrated_services_routervg204xm_analog_voice_gateway819_hardened_integrated_services_router887vam-w_integrated_services_router3925e_integrated_services_router887vamg_3g_integrated_services_router861_integrated_services_router812_3g_integrated_services_routerc897va_integrated_services_routerc892fsp_integrated_services_router887va_integrated_services_router886va-cube_integrated_services_routerc886va_integrated_services_routers2911_integrated_services_routerc891fw_integrated_services_router866vae_integrated_services_router891w_integrated_services_routerc898ea_integrated_services_router800_series_routers888e-cube_integrated_services_router1941_integrated_services_router880-voice_integrated_services_router819_hardened_dual_radio_802.11n_wifi_integrated_services_router897_multi-mode_vdsl2\/adsl2\+_potsios1941w_integrated_services_router3945e_integrated_services_routerc897va-m_integrated_services_router887vag_3g_integrated_services_router819_integrated_services_router892_integrated_services_router887va-cube_integrated_services_router887va-w_integrated_services_router819_non-hardened_4g_lte_m2m3945_integrated_services_router881-cube_integrated_services_router881_3g800m_integrated_services_router881_secure_fast_ethernet891_integrated_services_router896_multi-mode_vdsl2\/adsl2\+_isdnc881w_integrated_services_router1120_connected_grid_router891-24x_integrated_services_router888_integrated_services_router2901_integrated_services_router892f-cube_integrated_services_router888e_integrated_services_router2911a_integrated_services_router861w_integrated_services_routerc888_integrated_services_router829_industrial_integrated_services_router867vae_integrated_services_routerc897vaw_integrated_services_router887_multi-mode_vdsl2\/asdl2\+_potsvg3x0_analog_voice_gateway881w_integrated_services_routerCisco IOS
CWE ID-CWE-287
Improper Authentication
CVE-2018-0247
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.34% / 56.84%
||
7 Day CHG~0.00%
Published-02 May, 2018 | 22:00
Updated-29 Nov, 2024 | 15:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Web Authentication (WebAuth) clients for the Cisco Wireless LAN Controller (WLC) and Aironet Access Points running Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic. The vulnerability is due to incorrect implementation of authentication for WebAuth clients in a specific configuration. An attacker could exploit this vulnerability by sending traffic to local network resources without having gone through authentication. A successful exploit could allow the attacker to bypass authentication and pass traffic. This affects Cisco Aironet Access Points running Cisco IOS Software and Cisco Wireless LAN Controller (WLC) releases prior to 8.5.110.0 for the following specific WLC configuration only: (1) The Access Point (AP) is configured in FlexConnect Mode with NAT. (2) The WLAN is configured for central switching, meaning the client is being assigned a unique IP address. (3) The AP is configured with a Split Tunnel access control list (ACL) for access to local network resources, meaning the AP is doing the NAT on the connection. (4) The client is using WebAuth. This vulnerability does not apply to .1x clients in the same configuration. Cisco Bug IDs: CSCvc79502, CSCvf71789.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-aironet_access_point_softwarewireless_lan_controller_softwareCisco Wireless LAN Controller and Aironet Access Points
CWE ID-CWE-287
Improper Authentication
CVE-2017-12213
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.24% / 46.93%
||
7 Day CHG~0.00%
Published-07 Sep, 2017 | 21:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the dynamic access control list (ACL) feature of Cisco IOS XE Software running on Cisco Catalyst 4000 Series Switches could allow an unauthenticated, adjacent attacker to cause dynamic ACL assignment to fail and the port to fail open. This could allow the attacker to pass traffic to the default VLAN of the affected port. The vulnerability is due to an uncaught error condition that may occur during the reassignment of the auth-default-ACL dynamic ACL to a switch port after 802.1x authentication fails. A successful exploit of this issue could allow a physically adjacent attacker to bypass 802.1x authentication and cause the affected port to fail open, allowing the attacker to pass traffic to the default VLAN of the affected switch port. Cisco Bug IDs: CSCvc72751.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-catalyst_4000ios_xeCisco Catalyst 4000 Series Switches
CWE ID-CWE-287
Improper Authentication
CVE-2019-12664
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.68% / 71.75%
||
7 Day CHG~0.00%
Published-25 Sep, 2019 | 20:16
Updated-21 Nov, 2024 | 19:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software ISDN Data Leak Vulnerability

A vulnerability in the Dialer interface feature for ISDN connections in Cisco IOS XE Software for Cisco 4000 Series Integrated Services Routers (ISRs) could allow an unauthenticated, adjacent attacker to pass IPv4 traffic through an ISDN channel prior to successful PPP authentication. The vulnerability is due to insufficient validation of the state of the PPP IP Control Protocol (IPCP). An attacker could exploit this vulnerability by making an ISDN call to an affected device and sending traffic through the ISDN channel prior to successful PPP authentication. Alternatively, an unauthenticated, remote attacker could exploit this vulnerability by sending traffic through an affected device that is configured to exit via an ISDN connection for which both the Dialer interface and the Basic Rate Interface (BRI) have been configured, but the Challenge Handshake Authentication Protocol (CHAP) password for PPP does not match the remote end. A successful exploit could allow the attacker to pass IPv4 traffic through an unauthenticated ISDN connection for a few seconds, from initial ISDN call setup until PPP authentication fails.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xe4351_integrated_services_router4331_integrated_services_router4321_integrated_services_routerCisco IOS XE Software
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-287
Improper Authentication
CVE-2021-1228
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.08% / 23.99%
||
7 Day CHG~0.00%
Published-24 Feb, 2021 | 19:30
Updated-08 Nov, 2024 | 23:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Nexus 9000 Series Fabric Switches ACI Mode Fabric Infrastructure VLAN Unauthorized Access Vulnerability

A vulnerability in the fabric infrastructure VLAN connection establishment of Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) Mode could allow an unauthenticated, adjacent attacker to bypass security validations and connect an unauthorized server to the infrastructure VLAN. This vulnerability is due to insufficient security requirements during the Link Layer Discovery Protocol (LLDP) setup phase of the infrastructure VLAN. An attacker could exploit this vulnerability by sending a crafted LLDP packet on the adjacent subnet to an affected device. A successful exploit could allow the attacker to connect an unauthorized server to the infrastructure VLAN, which is highly privileged. With a connection to the infrastructure VLAN, the attacker can make unauthorized connections to Cisco Application Policy Infrastructure Controller (APIC) services or join other host endpoints.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_93180lc-exnexus_9332pqnexus_93108tc-exnx-osnexus_9372pxnexus_9364c-gxnexus_9508nexus_93108tc-fx-24nexus_92304qcnexus_93120txnexus_92160yc-xnexus_93128txnexus_9316d-gxnexus_9336pq_aci_spinenexus_93108tc-ex-24nexus_9372tx-enexus_93108tc-fxnexus_93360yc-fx2nexus_9396txnexus_93180yc-fx3snexus_9332cnexus_9364cnexus_92300ycnexus_92348gc-xnexus_9336c-fx2nexus_9348gc-fxpnexus_9272qnexus_93180yc-fx-24nexus_9336c-fx2-enexus_9396pxnexus_93216tc-fx2nexus_93240yc-fx2nexus_93180yc-fxnexus_9372txnexus_93180yc-exnexus_93600cd-gxnexus_9000vnexus_9372px-enexus_9236cnexus_93180yc-fx3nexus_93180yc-ex-24Cisco NX-OS System Software in ACI Mode 11.0(1b)
CWE ID-CWE-284
Improper Access Control
CVE-2020-3222
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.07% / 20.83%
||
7 Day CHG~0.00%
Published-03 Jun, 2020 | 17:41
Updated-15 Nov, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Web UI Unauthenticated Proxy Service Vulnerability

A vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass access control restrictions on an affected device. The vulnerability is due to the presence of a proxy service at a specific endpoint of the web UI. An attacker could exploit this vulnerability by connecting to the proxy service. An exploit could allow the attacker to bypass access restrictions on the network by proxying their access request through the management network of the affected device. As the proxy is reached over the management virtual routing and forwarding (VRF), this could reduce the effectiveness of the bypass.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software 16.10.1
CWE ID-CWE-17
Not Available
CVE-2020-3174
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.10% / 27.73%
||
7 Day CHG~0.00%
Published-26 Feb, 2020 | 16:50
Updated-15 Nov, 2024 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco NX-OS Software Anycast Gateway Invalid ARP Vulnerability

A vulnerability in the anycast gateway feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a device to learn invalid Address Resolution Protocol (ARP) entries. The ARP entries are for nonlocal IP addresses for the subnet. The vulnerability is due to improper validation of a received gratuitous ARP (GARP) request. An attacker could exploit this vulnerability by sending a malicious GARP packet on the local subnet to cause the ARP table on the device to become corrupted. A successful exploit could allow the attacker to populate the ARP table with incorrect entries, which could lead to traffic disruptions.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_93180lc-exnexus_9332pqnexus_3172tqnexus_93108tc-exnx-osnexus_3636c-rnexus_9508nexus_93120txnexus_93128txnexus_9336pq_aci_spinemds_9506nexus_3548-xlnexus_31128pqnexus_3132q-vnexus_9332cnexus_9364cnexus_3164qnexus_92348gc-xnexus_3172tq-32tnexus_9336c-fx2nexus_3524-xnexus_3132c-znexus_31108tc-vnexus_9348gc-fxpnexus_3172mds_9718nexus_9272qnexus_3464cmds_9148snexus_93216tc-fx2mds_9513nexus_36180yc-rmds_9148tnexus_93180yc-fxmds_9132tnexus_3264qnexus_3432d-snexus_34180ycnexus_9000vmds_9509nexus_31108pc-vmds_9706nexus_3524mds_9216nexus_3548nexus_3132qnexus_3016mds_9216anexus_9372pxnexus_92304qcnexus_92160yc-xnexus_9504nexus_3048nexus_9372tx-enexus_93108tc-fxnexus_93360yc-fx2nexus_3524-xlnexus_9396txnexus_3232c_nexus_7000nexus_92300ycnexus_3064nexus_9396pxmds_9222imds_9216inexus_3264c-enexus_93240yc-fx2nexus_9372txnexus_3548-xnexus_3132q-xlnexus_3064-tmds_9710nexus_3172tq-xlnexus_93180yc-exnexus_3408-snexus_9372px-enexus_9236cnexus_9516nexus_3172pq-xlnexus_7700Cisco NX-OS Software 7.3(2)D1(1d)
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2020-3418
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.06% / 19.30%
||
7 Day CHG~0.00%
Published-24 Sep, 2020 | 18:01
Updated-13 Nov, 2024 | 17:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Wireless Controller Software for the Catalyst 9000 Family Improper Access Control Vulnerability

A vulnerability in Cisco IOS XE Wireless Controller Software for Cisco Catalyst 9800 Series Routers could allow an unauthenticated, adjacent attacker to send ICMPv6 traffic prior to the client being placed into RUN state. The vulnerability is due to an incomplete access control list (ACL) being applied prior to RUN state. An attacker could exploit this vulnerability by connecting to the associated service set identifier (SSID) and sending ICMPv6 traffic. A successful exploit could allow the attacker to send ICMPv6 traffic prior to RUN state.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xecatalyst_9800-lcatalyst_9800-l-ccatalyst_9800-40catalyst_9800-clcatalyst_9800-80catalyst_9800-l-fCisco IOS XE Software
CWE ID-CWE-284
Improper Access Control
CVE-2020-26141
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.24% / 46.48%
||
7 Day CHG~0.00%
Published-11 May, 2021 | 19:42
Updated-14 Apr, 2026 | 09:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The Wi-Fi implementation does not verify the Message Integrity Check (authenticity) of fragmented TKIP frames. An adversary can abuse this to inject and possibly decrypt packets in WPA or WPA2 networks that support the TKIP data-confidentiality protocol.

Action-Not Available
Vendor-alfan/aSiemens AGCisco Systems, Inc.
Product-meraki_gr106gk5748-1gd00-0ab0_firmware6gk5788-1gd00-0ab06gk5786-1fc00-0aa0_firmware6gk5788-1gd00-0ab0_firmware6gk5788-2fc00-0aa0_firmwarewebex_desk_series_firmware6gk5748-1gd00-0aa0_firmwaremeraki_mr26_firmwaremeraki_mr55_firmwaremeraki_mr70_firmwaremeraki_z3_firmware6gk5788-2gd00-0ta06gk5786-2fc00-0ac0_firmwarewebex_wireless_phone_840_firmware6gk5786-2fc00-0aa0_firmware6gk5774-1fx00-0aa0ip_phone_88656gk5721-1fc00-0aa0_firmware6gk5738-1gy00-0ab0ip_phone_8865_firmwaremeraki_mx65w6gk5788-2gd00-0tc0_firmware6gk5786-2hc00-0aa0_firmware6gk5721-1fc00-0ab0_firmwareip_phone_8861_firmwaremeraki_mx64w_firmwaremeraki_mx67cwmeraki_mr70awus036h6gk5774-1fx00-0aa66gk5788-2fc00-0ac0_firmwaremeraki_mr46_firmware6gk5774-1fx00-0ab0meraki_gr60_firmwaremeraki_mr45_firmwaremeraki_mr46emeraki_mr846gk5786-1fc00-0ab06gk5786-2hc00-0aa06gk5738-1gy00-0ab0_firmware6gk5748-1gd00-0aa06gk5774-1fx00-0ab0_firmwaremeraki_mx67w6gk5734-1fx00-0ab0_firmwaremeraki_z3meraki_mr33meraki_mr20_firmware6gk5786-2fc00-0ab06gk5788-2gd00-0ab0meraki_mr746gk5788-1fc00-0aa0meraki_mx67w_firmwaremeraki_mr556gk5761-1fc00-0ab0_firmwaremeraki_mr206gk5786-2hc00-0ab0_firmwaremeraki_mr26meraki_mr62meraki_mr86meraki_mr326gk5761-1fc00-0ab0meraki_mr366gk5761-1fc00-0aa0_firmwaremeraki_mr44_firmwaremeraki_mx68cw6gk5734-1fx00-0ab0meraki_mr32_firmwaremeraki_mr566gk5778-1gy00-0ab0ip_conference_phone_8832_firmwarewireless_ip_phone_8821_firmware6gk5738-1gy00-0aa0_firmware6gk5786-2fc00-0ac0meraki_mr536gk5788-1gd00-0aa0meraki_mr56_firmware6gk5788-2fc00-0aa06gk5722-1fc00-0ab0meraki_mr72_firmwaremeraki_mr45meraki_mr30hmeraki_mr726gk5734-1fx00-0aa0meraki_mr18_firmware6gk5788-1fc00-0aa0_firmwaremeraki_mr34_firmwaremeraki_mr42_firmware6gk5778-1gy00-0ta0_firmwaremeraki_mr526gk5722-1fc00-0aa0meraki_mr12meraki_z3c_firmware6gk5778-1gy00-0aa0meraki_mr74_firmwarewebex_board_series6gk5734-1fx00-0aa6_firmwareip_phone_6861meraki_mx68w6gk5778-1gy00-0tb0_firmware6gk5788-2gd00-0tb0_firmwaremeraki_mr62_firmwaremeraki_mr346gk5786-1fc00-0ab0_firmware6gk5734-1fx00-0ab6meraki_mx64wwireless_ip_phone_8821meraki_mr52_firmwarewebex_wireless_phone_8406gk5774-1fx00-0aa0_firmwaremeraki_mr446gk5774-1fy00-0tb0_firmwareip_phone_88616gk5722-1fc00-0aa0_firmware6gk5788-1fc00-0ab0_firmwaremeraki_mr12_firmwaremeraki_mr42e_firmware6gk5738-1gy00-0aa06gk5778-1gy00-0aa0_firmware6gk5748-1fc00-0aa0_firmwarewebex_room_series_firmware6gk5788-2fc00-0ab06gk5778-1gy00-0ab0_firmware6gk5788-2gd00-0aa0_firmware6gk5748-1fc00-0ab0meraki_mr53e_firmwareip_conference_phone_88326gk5774-1fy00-0ta0_firmwaremeraki_mx68cw_firmware6gk5721-1fc00-0ab0meraki_mr86_firmware6gk5788-2fc00-0ab0_firmwaremeraki_mr766gk5774-1fx00-0ab6_firmwaremeraki_mr66meraki_mr66_firmware6gk5786-2fc00-0aa0ip_phone_6861_firmware6gk5734-1fx00-0aa0_firmware6gk5786-2fc00-0ab0_firmwaremeraki_mr46awus036h_firmware6gk5748-1fc00-0ab0_firmware6gk5722-1fc00-0ac0_firmware6gk5788-2gd00-0aa0meraki_mr33_firmware6gk5748-1fc00-0aa06gk5788-2gd00-0tc06gk5734-1fx00-0ab6_firmwaremeraki_mr30h_firmware6gk5761-1fc00-0aa0webex_wireless_phone_8606gk5788-2fc00-0ac06gk5788-2gd00-0ab0_firmware6gk5722-1fc00-0ab0_firmware6gk5788-2gd00-0tb06gk5788-1gd00-0aa0_firmware6gk5774-1fx00-0aa6_firmwaremeraki_mr42meraki_mx65w_firmware6gk5778-1gy00-0tb0meraki_z3c6gk5748-1gd00-0ab06gk5774-1fx00-0ab66gk5786-1fc00-0aa0webex_wireless_phone_860_firmware6gk5721-1fc00-0aa0meraki_mx67cw_firmwaremeraki_mx68w_firmware6gk5734-1fx00-0aa6meraki_mr42emeraki_mr84_firmwaremeraki_mr76_firmwaremeraki_gr60meraki_mr36_firmwaremeraki_mr53_firmwaremeraki_mr53ewebex_room_series6gk5722-1fc00-0ac06gk5778-1gy00-0ta06gk5788-1fc00-0ab0meraki_mr186gk5788-2gd00-0ta0_firmwarewebex_board_series_firmware6gk5786-2hc00-0ab0webex_desk_series6gk5774-1fy00-0tb0meraki_gr10_firmwaremeraki_mr46e_firmware6gk5774-1fy00-0ta0n/aSCALANCE W786-2 SFPSCALANCE W788-1 RJ45SCALANCE W788-2 M12 EECSCALANCE W734-1 RJ45 (USA)SCALANCE W738-1 M12SCALANCE W774-1 RJ45SCALANCE W786-2 RJ45SCALANCE W734-1 RJ45SCALANCE W748-1 M12SCALANCE W786-1 RJ45SCALANCE W788-2 RJ45SCALANCE W774-1 M12 EECSCALANCE W774-1 RJ45 (USA)SCALANCE W778-1 M12SCALANCE W788-2 M12SCALANCE W778-1 M12 EEC (USA)SCALANCE W788-1 M12SCALANCE W721-1 RJ45SCALANCE W786-2IA RJ45SCALANCE W778-1 M12 EECSCALANCE W761-1 RJ45SCALANCE W748-1 RJ45SCALANCE W722-1 RJ45
CWE ID-CWE-354
Improper Validation of Integrity Check Value
CVE-2020-26140
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.16% / 35.89%
||
7 Day CHG~0.00%
Published-11 May, 2021 | 19:34
Updated-14 Apr, 2026 | 09:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the ALFA Windows 10 driver 6.1316.1209 for AWUS036H. The WEP, WPA, WPA2, and WPA3 implementations accept plaintext frames in a protected Wi-Fi network. An adversary can abuse this to inject arbitrary data frames independent of the network configuration.

Action-Not Available
Vendor-alfan/aArista Networks, Inc.Cisco Systems, Inc.Intel CorporationSiemens AG
Product-meraki_gr10ir829gw-lte-ga-ck9scalance_wum766-1_6ghz_firmwaremeraki_mr26_firmwarecatalyst_9120aximeraki_mr55_firmwarecatalyst_9105axw1100_firmwareaironet_2702scalance_w748-1_firmwarec-120aironet_3800i_firmwareip_phone_8865webex_board_85scatalyst_9130axiip_phone_8821_firmwarescalance_w721-1_firmwareaironet_ap803_firmwareaironet_3800ecatalyst_9115axiir829-2lte-ea-ak9_firmwarecatalyst_9117aironet_2800_firmwareir829gw-lte-ga-zk9_firmwareaironet_1542dproset_ac_8260meraki_mx67cwawus036hac_9260webex_room_kitmeraki_gr60_firmwareaironet_ap803catalyst_9105axw_firmwaremeraki_mr84catalyst_9130_apmeraki_mr45_firmwareac_9560_firmwarec-260_firmwareproset_ac_9560_firmwareaironet_3800pcatalyst_91241100-8p_firmwareip_phone_8832meraki_mx67wkiller_ac_1550_firmwareaironet_2800imeraki_z3meraki_mr33aironet_3702meraki_mr20_firmwarewebex_room_55meraki_mr74c-230_firmwareesw6300_firmwareaironet_2800catalyst_iw6300_dcwscalance_w788-2_firmwareir829-2lte-ea-ak9webex_board_85s_firmwaremeraki_mr20catalyst_9120_ap_firmwarescalance_w734-1_firmwareproset_wi-fi_6_ax200_firmwarescalance_w738-1aironet_1562i_firmwareo-90esw6300meraki_mr62meraki_mr32killer_wi-fi_6_ax1650proset_ac_3168_firmwarec-200_firmwareaironet_3702_firmwarekiller_ac_1550meraki_mr36aironet_1542i_firmwareir829gw-lte-ga-sk9_firmwarewi-fi_6_ax200meraki_mr44_firmwaremeraki_mx68cwmeraki_mr32_firmwareaironet_1532_firmwarescalance_w748-1killer_wi-fi_6_ax1650_firmwarec-230scalance_w788-1_firmwareproset_ac_9462aironet_1532meraki_mr56_firmware1100-4p_firmwareaironet_1815i_firmwarescalance_w786-2iaaironet_1572_firmwaremeraki_mr72_firmwareproset_wi-fi_6_ax201webex_room_70_single_g2meraki_mr30hmeraki_mr72catalyst_9117axi_firmwaremeraki_mr34_firmwaremeraki_mr42_firmwarewebex_board_70proset_ac_8265_firmwaremeraki_mr52proset_ac_9461_firmwarecatalyst_9120_firmwaremeraki_mr74_firmwareproset_ac_3165aironet_1562e_firmware1109-2pcatalyst_iw6300_ac_firmwarewebex_board_55s_firmwaremeraki_mr62_firmwaremeraki_mx64wwi-fi_6_ax201c-75_firmware1109-4paironet_1815_firmwarecatalyst_9115scalance_w1748-1scalance_w786-2_firmwarescalance_w778-1c-75aironet_2702_firmwaremeraki_mr52_firmwarecatalyst_9124axd_firmwarecatalyst_9124_firmwaremeraki_mr44aironet_1562iscalance_wum763-1meraki_mr12_firmwareir829-2lte-ea-ek9ac_9560webex_room_55_dualmeraki_mr42e_firmwarescalance_w722-1c-65_firmwareaironet_1560_firmwarescalance_w1788-2iacatalyst_iw6300_acaironet_1542d_firmwareaironet_2800i_firmwarec-2001100-8paironet_1552_firmwarescalance_w778-1_firmwarewebex_dx70_firmware1109-2p_firmwareaironet_1800iaironet_1842_firmwareir829-2lte-ea-ek9_firmwaremeraki_mr86_firmwarewebex_board_70_firmwareproset_ac_9462_firmwareaironet_1852meraki_mr66catalyst_9115_ap_firmwareesw-6300-con-x-k9_firmwareir829gw-lte-na-ak9aironet_iw3702c-100o-105ip_phone_6861_firmwareaironet_1560awus036h_firmwarescalance_wum766-1webex_room_kit_firmwaremeraki_mr33_firmwarec-130_firmwaremeraki_mr30h_firmwarescalance_wam766-1_6ghz_firmwareo-90_firmwareproset_wi-fi_6e_ax210webex_board_70s_firmwaremeraki_mr42meraki_mx65w_firmwareac_8260_firmwarescalance_wum766-1_6ghzproset_ac_9560scalance_wam766-1_6ghzaironet_1832scalance_w761-1scalance_w774-1_firmwareproset_ac_9260_firmwarecatalyst_9124axdmeraki_mr42emeraki_mr84_firmwarecatalyst_9120axemeraki_mr76_firmwaremeraki_mr53_firmwarecatalyst_9130axeaironet_1815proset_wireless_7265_\(rev_d\)_firmwarescalance_w734-1proset_ac_3165_firmwarecatalyst_9130axe_firmwaremeraki_gr10_firmwaremeraki_mr46e_firmwarew-118esw-6300-con-x-k9aironet_1832_firmwareproset_ac_8265proset_ac_8260_firmwarecatalyst_9115_firmwareproset_wireless_7265_\(rev_d\)scalance_wam766-1scalance_wum766-1_firmwarecatalyst_iw6300_dcwi-fi_6_ax200_firmwarecatalyst_9117_ap_firmwaremeraki_z3_firmwaremeraki_mr70_firmware1101-4p_firmwareir829gw-lte-ga-zk9webex_room_70_dual_g2aironet_1702_firmwarewi-fi_6_ax201_firmwarec-110_firmwareproset_wi-fi_6_ax200aironet_1702scalance_w786-1aironet_3800webex_dx80scalance_w1788-2catalyst_9124axi_firmwareip_phone_8865_firmwaremeraki_mx65wcatalyst_9130webex_room_70_dualaironet_1852_firmwarewebex_board_55scatalyst_9105axicatalyst_9120axi_firmwareip_phone_8861_firmwareir829-2lte-ea-bk9meraki_mx64w_firmwareo-105_firmwareaironet_4800_firmwarecatalyst_9115axe_firmwaremeraki_mr70meraki_mr46_firmwarescalance_w774-1ac_8265_firmwarekiller_wi-fi_6e_ax1675webex_dx70aironet_1562dmeraki_mr46ecatalyst_9130axi_firmwarecatalyst_9117axiscalance_w1750d_firmwarecatalyst_9120_apcatalyst_9105axi_firmwareaironet_1800aironet_1842catalyst_9120axe_firmware1109-4p_firmwarecatalyst_iw6300_dcw_firmwareaironet_2800escalance_w1788-1scalance_w1788-2_firmwarecatalyst_9130_firmwarekiller_wi-fi_6e_ax1675_firmwaremeraki_mx67w_firmwareac_9260_firmwaremeraki_mr55webex_board_55_firmwarewebex_room_kit_minic-100_firmwareaironet_1810_firmwarewebex_room_70meraki_mr26webex_board_70sw-68_firmwarec-260catalyst_iw6300_dc_firmwareac_8260aironet_1562emeraki_mr86webex_room_70_dual_firmwareproset_wi-fi_6_ax201_firmwarew-118_firmwarec-120_firmwareaironet_3800imeraki_mr56aironet_1552hscalance_wam763-1scalance_w1750dscalance_wam763-1_firmwareaironet_1552meraki_mr53scalance_w1748-1_firmwarec-130webex_room_70_firmwareaironet_3800_firmwareir829-2lte-ea-bk9_firmwarescalance_w788-2aironet_1815icatalyst_9120axpmeraki_mr45scalance_w786-2ia_firmwarec-250_firmwarescalance_w788-1catalyst_iw6300aironet_1572meraki_mr12meraki_z3c_firmwareaironet_1800_firmware1101-4paironet_1552h_firmwareip_phone_68611100proset_ac_9260meraki_mx68wir829gw-lte-vz-ak9meraki_mr34catalyst_9115_apip_phone_8832_firmwarewebex_room_70_dual_g2_firmwareac_8265proset_ac_3168catalyst_9105_firmwareir829gw-lte-ga-sk9proset_wi-fi_6e_ax210_firmwarecatalyst_9115axeip_phone_8861catalyst_9117_firmwareaironet_1562d_firmwarewebex_room_kit_mini_firmwarewebex_room_70_single_firmwareip_phone_8821c-110scalance_wam766-1_firmwarewebex_room_70_singlescalance_w738-1_firmwarecatalyst_9130_ap_firmwareaironet_2800e_firmwarecatalyst_9117_apir829gw-lte-ga-ek9proset_ac_9461scalance_w761-1_firmwaremeraki_mr53e_firmwaremeraki_mx68cw_firmwarescalance_w1788-2ia_firmwareir829gw-lte-ga-ek9_firmwareaironet_3800e_firmwaremeraki_mr76webex_room_55_dual_firmwaremeraki_mr66_firmwarecatalyst_iw6300_firmwarecatalyst_9120axp_firmwarec-235_firmwarewebex_board_55catalyst_9124axic-235meraki_mr46c-65aironet_1810w_firmwareaironet_1800i_firmwarescalance_w1788-1_firmwarewebex_room_70_single_g2_firmwarecatalyst_9105c-250scalance_w786-2catalyst_9120aironet_1810wscalance_w721-1meraki_z3caironet_4800scalance_w786-1_firmwarew-68aironet_iw3702_firmwareaironet_3800p_firmwarewebex_room_55_firmwaremeraki_mx67cw_firmwareir829gw-lte-vz-ak9_firmwaremeraki_mx68w_firmware1100-4paironet_1810meraki_gr60meraki_mr36_firmwaremeraki_mr53eir829gw-lte-na-ak9_firmwarecatalyst_9115axi_firmwarescalance_w722-1_firmwareaironet_1542iwebex_dx80_firmwareir829gw-lte-ga-ck9_firmwarescalance_wum763-1_firmwaren/aSCALANCE W786-2 SFPSCALANCE W788-1 RJ45SCALANCE W788-2 M12 EECSCALANCE W734-1 RJ45 (USA)SCALANCE W738-1 M12SCALANCE W774-1 RJ45SCALANCE W786-2 RJ45SCALANCE W734-1 RJ45SCALANCE W748-1 M12SCALANCE W786-1 RJ45SCALANCE W788-2 RJ45SCALANCE W774-1 M12 EECSCALANCE W774-1 RJ45 (USA)SCALANCE W778-1 M12SCALANCE W788-2 M12SCALANCE W778-1 M12 EEC (USA)SCALANCE W788-1 M12SCALANCE W721-1 RJ45SCALANCE W786-2IA RJ45SCALANCE W778-1 M12 EECSCALANCE W761-1 RJ45SCALANCE W748-1 RJ45SCALANCE W722-1 RJ45
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CVE-2019-1890
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.10% / 26.75%
||
7 Day CHG~0.00%
Published-04 Jul, 2019 | 20:00
Updated-21 Nov, 2024 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Nexus 9000 Series Fabric Switches ACI Mode Fabric Infrastructure VLAN Unauthorized Access Vulnerability

A vulnerability in the fabric infrastructure VLAN connection establishment of the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, adjacent attacker to bypass security validations and connect an unauthorized server to the infrastructure VLAN. The vulnerability is due to insufficient security requirements during the Link Layer Discovery Protocol (LLDP) setup phase of the infrastructure VLAN. An attacker could exploit this vulnerability by sending a malicious LLDP packet on the adjacent subnet to the Cisco Nexus 9000 Series Switch in ACI mode. A successful exploit could allow the attacker to connect an unauthorized server to the infrastructure VLAN, which is highly privileged. With a connection to the infrastructure VLAN, the attacker can make unauthorized connections to Cisco Application Policy Infrastructure Controller (APIC) services or join other host endpoints.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_93108tc-exn9k-x97160yc-ex9736pqnexus_93120txapplication_policy_infrastructure_controllernexus_92160yc-xnexus_9316d-gxn9k-x9732c-fxnexus_93108tc-fxnexus_93360yc-fx2n9k-x9464tx2nexus_9332cnexus_9364cnexus_9336c-fx2x9636q-rnexus_9348gc-fxpn9k-x9788tc-fx9536pqn9k-x9732c-exn9k-x9564txnexus_93216tc-fx2n9k-x9464px9432pqnexus_93240yc-fx2nexus_93180yc-fx9636pqn9k-x9432c-snexus_93180yc-exnexus_93600cd-gxn9k-x9636c-rxn9k-x9736c-fxn9k-x9564pxn9k-x9636c-rn9k-x9736c-exCisco NX-OS System Software in ACI Mode 11.0.1b
CWE ID-CWE-284
Improper Access Control
CVE-2019-1695
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.06% / 17.39%
||
7 Day CHG~0.00%
Published-03 May, 2019 | 15:10
Updated-21 Nov, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Adaptive Security Appliance and Firepower Threat Defense Software Layer 2 Filtering Bypass Vulnerability

A vulnerability in the detection engine of Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to send data directly to the kernel of an affected device. The vulnerability exists because the software improperly filters Ethernet frames sent to an affected device. An attacker could exploit this vulnerability by sending crafted packets to the management interface of an affected device. A successful exploit could allow the attacker to bypass the Layer 2 (L2) filters and send data directly to the kernel of the affected device. A malicious frame successfully delivered would make the target device generate a specific syslog entry.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_2140firepower_2120adaptive_security_appliance_softwarefirepower_2130firepower_2110firepower_threat_defenseCisco Firepower Threat Defense (FTD) SoftwareCisco Adaptive Security Appliance (ASA) Software
CWE ID-CWE-284
Improper Access Control
CVE-2019-1690
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.11% / 28.14%
||
7 Day CHG~0.00%
Published-11 Mar, 2019 | 22:00
Updated-21 Nov, 2024 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Application Policy Infrastructure Controller IPv6 Link-Local Address Vulnerability

A vulnerability in the management interface of Cisco Application Policy Infrastructure Controller (APIC) software could allow an unauthenticated, adjacent attacker to gain unauthorized access on an affected device. The vulnerability is due to a lack of proper access control mechanisms for IPv6 link-local connectivity imposed on the management interface of an affected device. An attacker on the same physical network could exploit this vulnerability by attempting to connect to the IPv6 link-local address on the affected device. A successful exploit could allow the attacker to bypass default access control restrictions on an affected device. Cisco Application Policy Infrastructure Controller (APIC) devices running versions prior to 4.2(0.21c) are affected.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_9300nexus_93180lc-exfirepower_4150nexus_56128pnexus_9332pqnexus_3172tqnexus_93108tc-exnexus_3636c-rnexus_9508firepower_2130nexus_93120txapplication_policy_infrastructure_controllerfirepower_4110nexus_93128txnexus_9336pq_aci_spineucs_6400firepower_2110firepower_4145nexus_3548-xlnexus_31128pqnexus_3132q-vnexus_9332cnexus_9364cnexus_3164qnexus_92348gc-xnexus_3172tq-32tnexus_5020nexus_9336c-fx2nexus_3524-xnexus_3132c-znexus_31108tc-vnexus_5548pnexus_9348gc-fxpnexus_5648qnexus_3172nexus_9272qnexus_3464cnexus_93216tc-fx2nexus_36180yc-rnexus_5672upnexus_93180yc-fxnexus_3264qfirepower_4140nexus_3432d-snexus_34180ycnexus_9000vmds_9509nexus_31108pc-vnexus_5596upfirepower_4115nexus_3524nexus_3548nexus_3132qnexus_3016nexus_9372pxnexus_5696qnexus_92304qcnexus_92160yc-xucs_6248upfirepower_4125mds_9100nexus_9504nexus_3048nexus_9372tx-enexus_93108tc-fxnexus_93360yc-fx2nexus_3524-xlucs_6324nexus_9396txfirepower_4120nexus_7000nexus_92300ycnexus_3064ucs_6332nexus_3232cnexus_5548upnexus_9396pxfirepower_2120ucs_6296upnexus_5010nexus_5596tnexus_3264c-enexus_93240yc-fx2nexus_9372txnexus_5624qnexus_3548-xfirepower_4112nexus_3132q-xlnexus_3064-tfirepower_2140mds_9710nexus_3172tq-xlnexus_3408-snexus_93180yc-exnexus_9372px-enexus_9236cnexus_9516mds_9134nexus_3172pq-xlnexus_7700Cisco Application Policy Infrastructure Controller (APIC)
CWE ID-CWE-284
Improper Access Control
CVE-2012-0333
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.27% / 50.78%
||
7 Day CHG~0.00%
Published-02 May, 2012 | 10:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Small Business IP phones with SPA 500 series firmware 7.4.9 and earlier do not require authentication for Push XML requests, which allows remote attackers to make telephone calls via an XML document, aka Bug ID CSCts08768.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-small_business_ip_phone_firmwaresmall_business_ip_phonen/a
CWE ID-CWE-287
Improper Authentication
CVE-2012-0335
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.42% / 62.21%
||
7 Day CHG~0.00%
Published-02 May, 2012 | 10:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Adaptive Security Appliances (ASA) 5500 series devices with software 7.2 through 8.4 do not properly perform proxy authentication during attempts to cut through a firewall, which allows remote attackers to obtain sensitive information via a connection attempt, aka Bug ID CSCtx42746.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-adaptive_security_appliance_software5500_series_adaptive_security_appliancen/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-6624
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.29% / 52.39%
||
7 Day CHG~0.00%
Published-03 May, 2017 | 21:00
Updated-13 May, 2026 | 00:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco IOS 15.5(3)M Software for Cisco CallManager Express (CME) could allow an unauthenticated, remote attacker to make unauthorized phone calls. The vulnerability is due to a configuration restriction in the toll-fraud protections component of the affected software. An attacker could exploit this vulnerability to place unauthorized, long-distance phone calls by using an affected system. Cisco Bug IDs: CSCuy40939.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosCisco CallManager Express
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-264
Not Available
CVE-2011-4022
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.66% / 71.27%
||
7 Day CHG~0.00%
Published-03 May, 2012 | 10:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sensor in Cisco Intrusion Prevention System (IPS) 7.0 and 7.1 allows remote attackers to cause a denial of service (file-handle exhaustion and mainApp hang) by making authentication attempts that exceed the configured limit, aka Bug ID CSCto51204.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-intrusion_prevention_systemn/a
CWE ID-CWE-287
Improper Authentication
CVE-2015-6389
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9||HIGH
EPSS-0.55% / 68.21%
||
7 Day CHG~0.00%
Published-13 Dec, 2015 | 02:00
Updated-06 May, 2026 | 22:30
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Prime Collaboration Assurance before 11.0 has a hardcoded cmuser account, which allows remote attackers to obtain access by establishing an SSH session and leveraging knowledge of this account's password, aka Bug ID CSCus62707.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-prime_collaboration_assurancen/a
CWE ID-CWE-287
Improper Authentication
CVE-2011-3297
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.8||HIGH
EPSS-1.01% / 77.30%
||
7 Day CHG~0.00%
Published-06 Oct, 2011 | 10:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Firewall Services Module (aka FWSM) 3.1 before 3.1(21), 3.2 before 3.2(22), 4.0 before 4.0(16), and 4.1 before 4.1(7), when certain authentication configurations are used, allows remote attackers to cause a denial of service (module crash) by making many authentication requests for network access, aka Bug ID CSCtn15697.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-firewall_services_module_softwarecatalyst_6500catalyst_7600n/a
CWE ID-CWE-287
Improper Authentication
CVE-2011-2054
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.17% / 37.55%
||
7 Day CHG~0.00%
Published-19 Feb, 2020 | 03:05
Updated-15 Nov, 2024 | 17:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco ASA Secondary Authentication Bypass Vulnerability

A vulnerability in the Cisco ASA that could allow a remote attacker to successfully authenticate using the Cisco AnyConnect VPN client if the Secondary Authentication type is LDAP and the password is left blank, providing the primary credentials are correct. The vulnerabilities is due to improper input validation of certain parameters passed to the affected software. An attacker must have the correct primary credentials in order to successfully exploit this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asa_5500asa_5510_firmwareasa_5585-x_firmwareasa_5520asa_5510asa_5540_firmwareasa_5580_firmwareasa_5520_firmwareasa_5515-xasa_5500_firmwareasa_5550asa_5545-x_firmwareasa_5545-xasa_5525-x_firmwareasa_5540asa_5555-xasa_5580asa_5585-xasa_5515-x_firmwareasa_5525-xasa_5555-x_firmwareasa_5512-x_firmwareasa_5550_firmwareasa_5512-xCisco ASA
CWE ID-CWE-287
Improper Authentication
CVE-2011-0383
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-10||HIGH
EPSS-4.70% / 89.45%
||
7 Day CHG~0.00%
Published-25 Feb, 2011 | 11:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Java Servlet framework on Cisco TelePresence Recording Server devices with software 1.6.x before 1.6.2 and Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug IDs CSCtf42005 and CSCtf42008.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-telepresence_recording_servertelepresence_recording_server_softwaretelepresence_multipoint_switch_softwaretelepresence_multipoint_switchn/a
CWE ID-CWE-287
Improper Authentication
CVE-2011-0392
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.78% / 73.72%
||
7 Day CHG~0.00%
Published-25 Feb, 2011 | 11:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco TelePresence Recording Server devices with software 1.6.x do not require authentication for an XML-RPC interface, which allows remote attackers to perform unspecified actions via a session on TCP port 8080, aka Bug ID CSCtg35833.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-telepresence_recording_server_softwaretelepresence_recording_servern/a
CWE ID-CWE-287
Improper Authentication
CVE-2011-0384
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-10||HIGH
EPSS-5.71% / 90.49%
||
7 Day CHG~0.00%
Published-25 Feb, 2011 | 11:00
Updated-29 Apr, 2026 | 01:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Java Servlet framework on Cisco TelePresence Multipoint Switch (CTMS) devices with software 1.0.x, 1.1.x, 1.5.x, and 1.6.x does not require administrative authentication for unspecified actions, which allows remote attackers to execute arbitrary code via a crafted request, aka Bug ID CSCtf01253.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-telepresence_multipoint_switch_softwaretelepresence_multipoint_switchn/a
CWE ID-CWE-287
Improper Authentication
CVE-2007-4632
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.26% / 49.12%
||
7 Day CHG~0.00%
Published-31 Aug, 2007 | 23:00
Updated-23 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco IOS 12.2E, 12.2F, and 12.2S places a "no login" line into the VTY configuration when an administrator makes certain changes to a (1) VTY/AUX or (2) CONSOLE setting on a device without AAA enabled, which allows remote attackers to bypass authentication and obtain a terminal session, a different vulnerability than CVE-1999-0293 and CVE-2005-2105.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosn/a
CWE ID-CWE-287
Improper Authentication
CVE-2022-20918
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-0.75% / 73.31%
||
7 Day CHG~0.00%
Published-10 Nov, 2022 | 17:29
Updated-26 Nov, 2024 | 16:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Simple Network Management Protocol (SNMP) access controls for Cisco FirePOWER Software for Adaptive Security Appliance (ASA) FirePOWER module, Cisco Firepower Management Center (FMC) Software, and Cisco Next-Generation Intrusion Prevention System (NGIPS) Software could allow an unauthenticated, remote attacker to perform an SNMP GET request using a default credential. This vulnerability is due to the presence of a default credential for SNMP version 1 (SNMPv1) and SNMP version 2 (SNMPv2). An attacker could exploit this vulnerability by sending an SNMPv1 or SNMPv2 GET request to an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the device using the default credential. This attack will only be successful if SNMP is configured, and the attacker can only perform SNMP GET requests; write access using SNMP is not allowed.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_firewall_management_centerfirepower_services_software_for_asaCisco Firepower Management CenterCisco FirePOWER Services Software for ASA
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2022-20733
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.52% / 66.88%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 17:55
Updated-06 Nov, 2024 | 16:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Identity Services Engine Authentication Bypass Vulnerability

A vulnerability in the login page of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to log in without credentials and access all roles without any restrictions. This vulnerability is due to exposed sensitive Security Assertion Markup Language (SAML) metadata. An attacker could exploit this vulnerability by using the exposed SAML metadata to bypass authentication to the user portal. A successful exploit could allow the attacker to access all roles without any restrictions.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-identity_services_engineCisco Identity Services Engine Software
CWE ID-CWE-287
Improper Authentication
CVE-2022-20695
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-10||CRITICAL
EPSS-2.65% / 85.88%
||
7 Day CHG~0.00%
Published-15 Apr, 2022 | 14:15
Updated-06 Nov, 2024 | 16:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Wireless LAN Controller Management Interface Authentication Bypass Vulnerability

A vulnerability in the authentication functionality of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to bypass authentication controls and log in to the device through the management interface This vulnerability is due to the improper implementation of the password validation algorithm. An attacker could exploit this vulnerability by logging in to an affected device with crafted credentials. A successful exploit could allow the attacker to bypass authentication and log in to the device as an administrator. The attacker could obtain privileges that are the same level as an administrative user but it depends on the crafted credentials. Note: This vulnerability exists because of a non-default device configuration that must be present for it to be exploitable. For details about the vulnerable configuration, see the Vulnerable Products section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-aironet_1562iaironet_1830evirtual_wireless_controlleraironet_1850eaironet_1560aironet_3800eaironet_1815t5520_wireless_controlleraironet_1850aironet_1562eaironet_2800iaironet_1542iaironet_3800paironet_1830aironet_1830iaironet_1815aironet_15408540_wireless_controlleraironet_1832aironet_1815iaironet_1815waironet_4800aironet_2800aironet_1542daironet_3800wireless_lan_controller_8.10.151.0aironet_1562daironet_18523504_wireless_controlleraironet_3800iwireless_lan_controller_8.10.162.0aironet_1850iaironet_1815maironet_2800eCisco Wireless LAN Controller (WLC)
CWE ID-CWE-303
Incorrect Implementation of Authentication Algorithm
CWE ID-CWE-287
Improper Authentication
CVE-2022-20798
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-1.31% / 79.96%
||
7 Day CHG~0.00%
Published-15 Jun, 2022 | 17:55
Updated-01 Nov, 2024 | 19:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Email Security Appliance and Cisco Secure Email and Web Manager External Authentication Bypass Vulnerability

A vulnerability in the external authentication functionality of Cisco Secure Email and Web Manager, formerly known as Cisco Security Management Appliance (SMA), and Cisco Email Security Appliance (ESA) could allow an unauthenticated, remote attacker to bypass authentication and log in to the web management interface of an affected device. This vulnerability is due to improper authentication checks when an affected device uses Lightweight Directory Access Protocol (LDAP) for external authentication. An attacker could exploit this vulnerability by entering a specific input on the login page of the affected device. A successful exploit could allow the attacker to gain unauthorized access to the web-based management interface of the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_email_and_web_manageremail_security_applianceCisco Email Security Appliance (ESA)
CWE ID-CWE-287
Improper Authentication
CVE-2022-20923
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4||MEDIUM
EPSS-0.15% / 35.55%
||
7 Day CHG~0.00%
Published-08 Sep, 2022 | 12:30
Updated-06 Nov, 2024 | 16:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers IPSec VPN Server Authentication Bypass Vulnerability

A vulnerability in the IPSec VPN Server authentication functionality of Cisco Small Business RV110W, RV130, RV130W, and RV215W Routers could allow an unauthenticated, remote attacker to bypass authentication controls and access the IPSec VPN network. This vulnerability is due to the improper implementation of the password validation algorithm. An attacker could exploit this vulnerability by logging in to the VPN from an affected device with crafted credentials. A successful exploit could allow the attacker to bypass authentication and access the IPSec VPN network. The attacker may obtain privileges that are the same level as an administrative user, depending on the crafted credentials that are used. Cisco has not released software updates that address this vulnerability.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv130w_firmwarerv130_firmwarerv110wrv110w_firmwarerv130wrv215wrv130rv215w_firmwareCisco Small Business RV Series Router Firmware
CWE ID-CWE-303
Incorrect Implementation of Authentication Algorithm
CWE ID-CWE-287
Improper Authentication
CVE-2022-20662
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.1||MEDIUM
EPSS-0.15% / 35.11%
||
7 Day CHG~0.00%
Published-30 Sep, 2022 | 18:45
Updated-06 Nov, 2024 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Duo for macOS Authentication Bypass Vulnerability

A vulnerability in the smart card login authentication of Cisco Duo for macOS could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability exists because the assigned user of a smart card is not properly matched with the authenticating user. An attacker could exploit this vulnerability by configuring a smart card login to bypass Duo authentication. A successful exploit could allow the attacker to use any personal identity verification (PIV) smart card for authentication, even if the smart card is not assigned to the authenticating user.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-duoCisco Duo
CWE ID-CWE-287
Improper Authentication
CVE-2024-20301
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.2||MEDIUM
EPSS-0.01% / 1.44%
||
7 Day CHG~0.00%
Published-06 Mar, 2024 | 16:28
Updated-24 Mar, 2025 | 13:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco Duo Authentication for Windows Logon and RDP could allow an authenticated, physical attacker to bypass secondary authentication and access an affected Windows device. This vulnerability is due to a failure to invalidate locally created trusted sessions after a reboot of the affected device. An attacker with primary user credentials could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the affected device without valid permissions.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-duo_authentication_for_windows_logon_and_rdpCisco Duo
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-613
Insufficient Session Expiration
CVE-2021-1468
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-2.60% / 85.74%
||
7 Day CHG~0.00%
Published-06 May, 2021 | 12:41
Updated-08 Nov, 2024 | 23:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN vManage Software Vulnerabilities

Multiple vulnerabilities in Cisco SD-WAN vManage Software could allow an unauthenticated, remote attacker to execute arbitrary code or gain access to sensitive information, or allow an authenticated, local attacker to gain escalated privileges or gain unauthorized access to the application. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sd-wan_vmanagecatalyst_sd-wan_managerCisco SD-WAN vManage
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-287
Improper Authentication
CVE-2021-1561
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.14% / 33.20%
||
7 Day CHG~0.00%
Published-18 Aug, 2021 | 19:40
Updated-07 Nov, 2024 | 22:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Secure Email and Web Manager Spam Quarantine Unauthorized Access Vulnerability

A vulnerability in the spam quarantine feature of Cisco Secure Email and Web Manager, formerly Cisco Security Management Appliance (SMA), could allow an authenticated, remote attacker to gain unauthorized access and modify the spam quarantine settings of another user. This vulnerability exists because access to the spam quarantine feature is not properly restricted. An attacker could exploit this vulnerability by sending malicious requests to an affected system. A successful exploit could allow the attacker to modify another user's spam quarantine settings, possibly disabling security controls or viewing email messages stored on the spam quarantine interfaces.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-secure_email_and_web_managerCisco Content Security Management Appliance (SMA)
CWE ID-CWE-302
Authentication Bypass by Assumed-Immutable Data
CWE ID-CWE-287
Improper Authentication
CVE-2021-1541
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.2||HIGH
EPSS-0.38% / 59.73%
||
7 Day CHG~0.00%
Published-16 Jun, 2021 | 17:35
Updated-07 Nov, 2024 | 22:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business 220 Series Smart Switches Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Small Business 220 Series Smart Switches could allow an attacker to do the following: Hijack a user session Execute arbitrary commands as a root user on the underlying operating system Conduct a cross-site scripting (XSS) attack Conduct an HTML injection attack For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sf220-24psg220-50p_firmwaresg220-26psg220-26sf220-48sf220-24_firmwaresg220-28mpsg220-26p_firmwaresg220-26_firmwaresf220-48p_firmwaresf220-24p_firmwaresg220-50sf220-48psg220-50_firmwaresg220-28mp_firmwaresg220-50psf220-24sf220-48_firmwareCisco Small Business 220 Series Smart Plus Switches
CWE ID-CWE-287
Improper Authentication
CVE-2021-1543
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.2||HIGH
EPSS-0.28% / 51.01%
||
7 Day CHG~0.00%
Published-16 Jun, 2021 | 17:45
Updated-07 Nov, 2024 | 22:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business 220 Series Smart Switches Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Small Business 220 Series Smart Switches could allow an attacker to do the following: Hijack a user session Execute arbitrary commands as a root user on the underlying operating system Conduct a cross-site scripting (XSS) attack Conduct an HTML injection attack For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sf220-24psg220-50p_firmwaresg220-26psg220-26sf220-48sf220-24_firmwaresg220-28mpsg220-26p_firmwaresg220-26_firmwaresf220-48p_firmwaresf220-24p_firmwaresg220-50sf220-48psg220-50_firmwaresg220-28mp_firmwaresg220-50psf220-24sf220-48_firmwareCisco Small Business 220 Series Smart Plus Switches
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-1571
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.2||HIGH
EPSS-0.26% / 49.14%
||
7 Day CHG~0.00%
Published-16 Jun, 2021 | 17:45
Updated-07 Nov, 2024 | 22:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business 220 Series Smart Switches Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Small Business 220 Series Smart Switches could allow an attacker to do the following: Hijack a user session Execute arbitrary commands as a root user on the underlying operating system Conduct a cross-site scripting (XSS) attack Conduct an HTML injection attack For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sf220-24psg220-50p_firmwaresg220-26psg220-26sf220-48sf220-24_firmwaresg220-28mpsg220-26p_firmwaresg220-26_firmwaresf220-48p_firmwaresf220-24p_firmwaresg220-50sf220-48psg220-50_firmwaresg220-28mp_firmwaresg220-50psf220-24sf220-48_firmwareCisco Small Business 220 Series Smart Plus Switches
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CVE-2021-1472
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-91.29% / 99.67%
||
7 Day CHG~0.00%
Published-08 Apr, 2021 | 04:06
Updated-08 Nov, 2024 | 17:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business RV Series Routers Vulnerabilities

Multiple vulnerabilities exist in the web-based management interface of Cisco Small Business RV Series Routers. A remote attacker could execute arbitrary commands or bypass authentication and upload files on an affected device. For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-rv260_firmwarerv340_firmwarerv345prv345rv160w_firmwarerv160_firmwarerv260w_firmwarerv345p_firmwarerv340w_firmwarerv160wrv260rv260wrv340wrv260prv345_firmwarerv340rv260p_firmwarerv160Cisco Small Business RV Series Router Firmware
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CWE ID-CWE-287
Improper Authentication
CVE-2021-1542
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.2||HIGH
EPSS-0.38% / 59.63%
||
7 Day CHG~0.00%
Published-16 Jun, 2021 | 17:45
Updated-07 Nov, 2024 | 22:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business 220 Series Smart Switches Vulnerabilities

Multiple vulnerabilities in the web-based management interface of Cisco Small Business 220 Series Smart Switches could allow an attacker to do the following: Hijack a user session Execute arbitrary commands as a root user on the underlying operating system Conduct a cross-site scripting (XSS) attack Conduct an HTML injection attack For more information about these vulnerabilities, see the Details section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sf220-24psg220-50p_firmwaresg220-26psg220-26sf220-48sf220-24_firmwaresg220-28mpsg220-26p_firmwaresg220-26_firmwaresf220-48p_firmwaresf220-24p_firmwaresg220-50sf220-48psg220-50_firmwaresg220-28mp_firmwaresg220-50psf220-24sf220-48_firmwareCisco Small Business 220 Series Smart Plus Switches
CWE ID-CWE-287
Improper Authentication
CVE-2018-0195
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.8||HIGH
EPSS-0.29% / 52.70%
||
7 Day CHG~0.00%
Published-28 Mar, 2018 | 22:00
Updated-02 Dec, 2024 | 20:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Cisco IOS XE Software REST API could allow an authenticated, remote attacker to bypass API authorization checks and use the API to perform privileged actions on an affected device. The vulnerability is due to insufficient authorization checks for requests that are sent to the REST API of the affected software. An attacker could exploit this vulnerability by sending a malicious request to an affected device via the REST API. A successful exploit could allow the attacker to selectively bypass authorization checks for the REST API of the affected software and use the API to perform privileged actions on an affected device. Cisco Bug IDs: CSCuz56428.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-ios_xeCisco IOS XE
CWE ID-CWE-287
Improper Authentication
CVE-2018-0087
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.6||MEDIUM
EPSS-0.28% / 51.29%
||
7 Day CHG~0.00%
Published-08 Mar, 2018 | 07:00
Updated-02 Dec, 2024 | 20:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the FTP server of the Cisco Web Security Appliance (WSA) could allow an unauthenticated, remote attacker to log in to the FTP server of the device without a valid password. The attacker does need to have a valid username. The vulnerability is due to incorrect FTP user credential validation. An attacker could exploit this vulnerability by using FTP to connect to the management IP address of the targeted device. A successful exploit could allow the attacker to log in to the FTP server of the Cisco WSA without having a valid password. This vulnerability affects Cisco AsyncOS for WSA Software on both virtual and hardware appliances that are running any release of Cisco AsyncOS 10.5.1 for WSA Software. The device is vulnerable only if FTP is enabled on the management interface. FTP is disabled by default. Cisco Bug IDs: CSCvf74281.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-asyncosCisco Web Security Appliance
CWE ID-CWE-287
Improper Authentication
CVE-2018-0318
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-3.30% / 87.33%
||
7 Day CHG~0.00%
Published-07 Jun, 2018 | 12:00
Updated-29 Nov, 2024 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the password reset function of Cisco Prime Collaboration Provisioning (PCP) could allow an unauthenticated, remote attacker to gain unauthorized access to an affected device. The vulnerability is due to insufficient validation of a password reset request. An attacker could exploit this vulnerability by submitting a password reset request and changing the password for any user on an affected system. An exploit could allow the attacker to gain administrative-level privileges on the affected system. This vulnerability affects Cisco Prime Collaboration Provisioning (PCP) Releases 11.6 and prior. Cisco Bug IDs: CSCvd07245.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-prime_collaborationprime_collaboration_provisioningCisco Prime Collaboration Provisioning unknown
CWE ID-CWE-255
Not Available
CWE ID-CWE-287
Improper Authentication
CVE-2018-0382
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.70% / 72.05%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 21:35
Updated-19 Nov, 2024 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Wireless LAN Controller Software Session Hijacking Vulnerability

A vulnerability in the session identification management functionality of the web-based interface of Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, remote attacker to hijack a valid user session on an affected system. The vulnerability exists because the affected software does not properly clear previously assigned session identifiers for a user session when a user authenticates to the web-based interface. An attacker could exploit this vulnerability by using an existing session identifier to connect to the software through the web-based interface. Successful exploitation could allow the attacker to hijack an authenticated user's browser session on the system. Versions 8.1 and 8.5 are affected.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-wireless_lan_controller_softwareCisco Wireless LAN Controller (WLC)
CWE ID-CWE-287
Improper Authentication
CVE-2018-0121
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-3.64% / 87.93%
||
7 Day CHG~0.00%
Published-22 Feb, 2018 | 00:00
Updated-02 Dec, 2024 | 21:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the authentication functionality of the web-based service portal of Cisco Elastic Services Controller Software could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrator privileges on an affected system. The vulnerability is due to improper security restrictions that are imposed by the web-based service portal of the affected software. An attacker could exploit this vulnerability by submitting an empty password value to an affected portal when prompted to enter an administrative password for the portal. A successful exploit could allow the attacker to bypass authentication and gain administrator privileges for the web-based service portal of the affected software. This vulnerability affects Cisco Elastic Services Controller Software Release 3.0.0. Cisco Bug IDs: CSCvg29809.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-elastic_services_controllervirtual_managed_servicesCisco Elastic Services Controller
CWE ID-CWE-287
Improper Authentication
CVE-2018-0116
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.2||HIGH
EPSS-0.36% / 57.85%
||
7 Day CHG~0.00%
Published-08 Feb, 2018 | 07:00
Updated-02 Dec, 2024 | 21:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the RADIUS authentication module of Cisco Policy Suite could allow an unauthenticated, remote attacker to be authorized as a subscriber without providing a valid password; however, the attacker must provide a valid username. The vulnerability is due to incorrect RADIUS user credential validation. An attacker could exploit this vulnerability by attempting to access a Cisco Policy Suite domain configured with RADIUS authentication. An exploit could allow the attacker to be authorized as a subscriber without providing a valid password. This vulnerability affects the Cisco Policy Suite application running a release prior to 13.1.0 with Hotfix Patch 1 when RADIUS authentication is configured for a domain. Cisco Policy Suite Release 14.0.0 is also affected, as it includes vulnerable code, but RADIUS authentication is not officially supported in Cisco Policy Suite Releases 14.0.0 and later. Cisco Bug IDs: CSCvg40124.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-mobility_services_engineCisco Policy Suite
CWE ID-CWE-287
Improper Authentication
CVE-2018-0435
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.1||CRITICAL
EPSS-1.60% / 81.84%
||
7 Day CHG~0.00%
Published-05 Oct, 2018 | 14:00
Updated-26 Nov, 2024 | 14:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Umbrella API Unauthorized Access Vulnerability

A vulnerability in the Cisco Umbrella API could allow an authenticated, remote attacker to view and modify data across their organization and other organizations. The vulnerability is due to insufficient authentication configurations for the API interface of Cisco Umbrella. An attacker could exploit this vulnerability to view and potentially modify data for their organization or other organizations. A successful exploit could allow the attacker to read or modify data across multiple organizations.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-umbrellaCisco Umbrella
CWE ID-CWE-287
Improper Authentication
CVE-2018-0319
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-3.30% / 87.33%
||
7 Day CHG~0.00%
Published-07 Jun, 2018 | 12:00
Updated-29 Nov, 2024 | 15:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the password recovery function of Cisco Prime Collaboration Provisioning (PCP) could allow an unauthenticated, remote attacker to gain unauthorized access to an affected device. The vulnerability is due to insufficient validation of a password recovery request. An attacker could exploit this vulnerability by submitting a password recovery request and changing the password for any user on an affected system. An exploit could allow the attacker to gain administrative-level privileges on the affected system. This vulnerability affects Cisco Prime Collaboration Provisioning (PCP) Releases 11.6 and prior. Cisco Bug IDs: CSCvd07253.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-prime_collaborationprime_collaboration_provisioningCisco Prime Collaboration Provisioning unknown
CWE ID-CWE-255
Not Available
CWE ID-CWE-287
Improper Authentication
CVE-2018-0321
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-2.60% / 85.73%
||
7 Day CHG~0.00%
Published-07 Jun, 2018 | 12:00
Updated-29 Nov, 2024 | 15:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco Prime Collaboration Provisioning (PCP) could allow an unauthenticated, remote attacker to access the Java Remote Method Invocation (RMI) system. The vulnerability is due to an open port in the Network Interface and Configuration Engine (NICE) service. An attacker could exploit this vulnerability by accessing the open RMI system on an affected PCP instance. An exploit could allow the attacker to perform malicious actions that affect PCP and the devices that are connected to it. This vulnerability affects Cisco Prime Collaboration Provisioning (PCP) Releases 11.6 and prior. Cisco Bug IDs: CSCvd61746.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-prime_collaborationprime_collaboration_provisioningprime_collaboration_assuranceCisco Prime Collaboration Provisioning unknown
CWE ID-CWE-287
Improper Authentication
CVE-2018-0362
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.12% / 30.52%
||
7 Day CHG~0.00%
Published-21 Jun, 2018 | 11:00
Updated-29 Nov, 2024 | 14:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in BIOS authentication management of Cisco 5000 Series Enterprise Network Compute System and Cisco Unified Computing (UCS) E-Series Servers could allow an unauthenticated, local attacker to bypass the BIOS authentication and execute actions as an unprivileged user. The vulnerability is due to improper security restrictions that are imposed by the affected system. An attacker could exploit this vulnerability by submitting an empty password value to an affected device's BIOS authentication prompt. An exploit could allow the attacker to have access to a restricted set of user-level BIOS commands. Cisco Bug IDs: CSCvh83260.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-ucs-e180d-k9_firmwareucs-e160dp-m1_firmwareucs-e160d-m1_firmwareucs-e140d-m1_firmwareucs-e1120d-k9_firmwareucs-e180d-m2_firmwareucs-e160d-m1ucs-e140dp-m1_firmwareucs-e180d-m3ucs-e160s-k9ucs-e140s-k9ucs-e160d-k9_firmwareucs-e140s-k9_firmwareucs-e140s-m1ucs-e160dp-m1ucs-e1120d-m3ucs-e140dp-m15100_enterprise_network_compute_system5400_enterprise_network_compute_systemucs-e1120d-m3_firmwareucs-e140d-k9ucs-e140d-m1ucs-e140dp-k9ucs-e140dp-k9_firmwareucs-e1120d-k9ucs-e160s-k9_firmwareucs-e180d-m2ucs-e140s-m2ucs-e160dp-k9_firmware5400_enterprise_network_compute_system_firmwareucs-e160d-m2ucs-e140d-k9_firmwareucs-e160d-k9ucs-e180d-k9ucs-e160dp-k9ucs-e160s-m3_firmwareucs-e160s-m3ucs-e160d-m2_firmwareucs-e140s-m2_firmware5100_enterprise_network_compute_system_firmwareucs-e180d-m3_firmwareucs-e140s-m1_firmwareCisco 5000 Series Enterprise Network Compute System and Cisco UCS E-Series Servers unknown
CWE ID-CWE-287
Improper Authentication
CVE-2018-0271
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-3.00% / 86.67%
||
7 Day CHG~0.00%
Published-17 May, 2018 | 03:00
Updated-29 Nov, 2024 | 15:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the API gateway of the Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and access critical services. The vulnerability is due to a failure to normalize URLs prior to servicing requests. An attacker could exploit this vulnerability by submitting a crafted URL designed to exploit the issue. A successful exploit could allow the attacker to gain unauthenticated access to critical services, resulting in elevated privileges in DNA Center. This vulnerability affects Cisco DNA Center Software Releases prior to 1.1.2. Cisco Bug IDs: CSCvi09394.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-digital_network_architecture_centerCisco Digital Network Architecture Center
CWE ID-CWE-287
Improper Authentication
CVE-2018-0238
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-9.9||CRITICAL
EPSS-3.68% / 88.02%
||
7 Day CHG~0.00%
Published-19 Apr, 2018 | 20:00
Updated-29 Nov, 2024 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the role-based resource checking functionality of the Cisco Unified Computing System (UCS) Director could allow an authenticated, remote attacker to view unauthorized information for any virtual machine in the UCS Director end-user portal and perform any permitted operations on any virtual machine. The permitted operations can be configured for the end user on the virtual machines with either of the following settings: The virtual machine is associated to a Virtual Data Center (VDC) that has an end user self-service policy attached to the VDC. The end user role has VM Management Actions settings configured under User Permissions. This is a global configuration, so all the virtual machines visible in the end-user portal will have the VM management actions available. The vulnerability is due to improper user authentication checks. An attacker could exploit this vulnerability by logging in to the UCS Director with a modified username and valid password. A successful exploit could allow the attacker to gain visibility into and perform actions against all virtual machines in the UCS Director end-user portal of the affected system. This vulnerability affects Cisco Unified Computing System (UCS) Director releases 6.0 and 6.5 prior to patch 3 that are in a default configuration. Cisco Bug IDs: CSCvh53501.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_computing_system_directorCisco UCS Director
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • 3
  • 4
  • 5
  • Next
Details not found