First published: Fri Oct 05 2018(Updated: )
A vulnerability in the MACsec Key Agreement (MKA) using Extensible Authentication Protocol-Transport Layer Security (EAP-TLS) functionality of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass authentication and pass traffic through a Layer 3 interface of an affected device. The vulnerability is due to a logic error in the affected software. An attacker could exploit this vulnerability by connecting to and passing traffic through a Layer 3 interface of an affected device, if the interface is configured for MACsec MKA using EAP-TLS and is running in access-session closed mode. A successful exploit could allow the attacker to bypass 802.1x network access controls and gain access to the network.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =16.8.1 | |
Cisco IOS XE Web UI | =16.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15372 is rated as HIGH severity due to the potential for unauthenticated attackers to bypass authentication.
To fix CVE-2018-15372, upgrade the affected Cisco IOS XE Software to version 16.8.2 or higher.
CVE-2018-15372 affects Cisco IOS XE versions 16.8.1 and 16.9.1.
CVE-2018-15372 cannot be exploited remotely as it requires adjacency to the target system.
An unauthenticated, adjacent attacker can exploit CVE-2018-15372 to bypass authentication.