A vulnerability in the social login configuration option for the guest users of Cisco Business Wireless Access Points (APs) could allow an unauthenticated, adjacent attacker to bypass social login authentication. This vulnerability is due to a logic error with the social login implementation. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the Guest Portal without authentication.
History

Fri, 25 Oct 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2023-05-18T00:00:00

Updated: 2024-10-25T15:58:19.897Z

Reserved: 2022-10-27T00:00:00

Link: CVE-2023-20003

cve-icon Vulnrichment

Updated: 2024-08-02T08:57:35.019Z

cve-icon NVD

Status : Modified

Published: 2023-05-18T03:15:09.477

Modified: 2024-11-21T07:40:19.190

Link: CVE-2023-20003

cve-icon Redhat

No data.