First published: Wed May 17 2023(Updated: )
A vulnerability in the social login configuration option for the guest users of Cisco Business Wireless Access Points (APs) could allow an unauthenticated, adjacent attacker to bypass social login authentication.This vulnerability is due to a logic error with the social login
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Business Access Points |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-cbw-auth-bypass-ggnAfdZ is classified as high due to its potential for unauthorized access.
To fix cisco-sa-cbw-auth-bypass-ggnAfdZ, update the software on your Cisco Business Wireless Access Points to the latest version available.
Cisco Business Wireless Access Points that utilize the social login configuration option for guest users are affected by cisco-sa-cbw-auth-bypass-ggnAfdZ.
cisco-sa-cbw-auth-bypass-ggnAfdZ allows an unauthenticated, adjacent attacker to bypass social login authentication.
cisco-sa-cbw-auth-bypass-ggnAfdZ is not categorized as a zero-day vulnerability since it has been publicly disclosed.