漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A vulnerability in Web Authentication (WebAuth) clients for the Cisco Wireless LAN Controller (WLC) and Aironet Access Points running Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic. The vulnerability is due to incorrect implementation of authentication for WebAuth clients in a specific configuration. An attacker could exploit this vulnerability by sending traffic to local network resources without having gone through authentication. A successful exploit could allow the attacker to bypass authentication and pass traffic. This affects Cisco Aironet Access Points running Cisco IOS Software and Cisco Wireless LAN Controller (WLC) releases prior to 8.5.110.0 for the following specific WLC configuration only: (1) The Access Point (AP) is configured in FlexConnect Mode with NAT. (2) The WLAN is configured for central switching, meaning the client is being assigned a unique IP address. (3) The AP is configured with a Split Tunnel access control list (ACL) for access to local network resources, meaning the AP is doing the NAT on the connection. (4) The client is using WebAuth. This vulnerability does not apply to .1x clients in the same configuration. Cisco Bug IDs: CSCvc79502, CSCvf71789.
漏洞信息
N/A
漏洞
认证机制不恰当
漏洞
Cisco Wireless LAN Controller和Aironet Access Points 授权问题漏洞
漏洞信息
Cisco Aironet Access Points、IOS Software和Wireless LAN Controller都是美国思科(Cisco)公司的产品。Cisco Aironet Access Points和Cisco Wireless LAN Controller是一套无线访问接入点设备。IOS Software是运行在其中的一套操作系统。Wireless LAN Controller是一款无线局域网控制器产品。该产品在无线局域网中提供安全策略、入侵检测等功能。Web Authentica
漏洞信息
N/A
漏洞
N/A