NAME __________ Cisco Access Point Software security bypass Platforms Affected: Cisco Aironet 1540 Series APs Cisco Aironet 1560 Series APs Cisco Aironet 1800 Series APs Cisco Aironet 2800 Series APs Cisco Aironet 3800 Series APs Cisco Aironet 4800 APs Cisco Business 100 Series APs and Mesh Extenders Cisco Business 200 Series APs Cisco 6300 Series Embedded Services APs (ESW6300) Cisco Access Point Software Cisco Catalyst 9115 APs Cisco Catalyst IW6300 Heavy Duty Series APs Cisco Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers Cisco Catalyst 9105AX Series APs Cisco Catalyst 9120AX Series APs Cisco Catalyst 9124AX Series APs Cisco Catalyst 9130AX Series APs Cisco Catalyst 9136 Series APs Cisco Catalyst Cellular Gateways Risk Level: 5.9 Exploitability: Unproven Consequences: Bypass Security
DESCRIPTION __________ Cisco Access Point Software could allow a physical authenticated attacker to bypass security restrictions, caused by unnecessary commands are available during boot time at the physical console. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass the Cisco Secure Boot validation checks and load an image.
CVSS 3.0 Information __________ Privileges Required: Low User Interaction: None Scope: Unchanged Access Vector: Physical
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
To keep up to date follow us on the below channels.
Continue Reading