CVE-2018-15395Improper Access Control in Cisco Wireless LAN Controller

Severity
5.4MEDIUMNVD
EPSS
0.1%
top 69.72%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 17
Latest updateMay 13

Description

A vulnerability in the authentication and authorization checking mechanisms of Cisco Wireless LAN Controller (WLC) Software could allow an authenticated, adjacent attacker to gain network access to a Cisco TrustSec domain. Under normal circumstances, this access should be prohibited. The vulnerability is due to the dynamic assignment of Security Group Tags (SGTs) during a wireless roam from one Service Set Identifier (SSID) to another within the Cisco TrustSec domain. An attacker could exploit t

CVSS vector

CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:NExploitability: 2.3 | Impact: 2.7

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-r7pm-6rfr-vfm2: A vulnerability in the authentication and authorization checking mechanisms of Cisco Wireless LAN Controller (WLC) Software could allow an authenticat2022-05-13
CVEList
Cisco Wireless LAN Controller Software Privilege Escalation Vulnerability2018-10-17

📋Vendor Advisories

1
Cisco
Cisco Wireless LAN Controller Software Privilege Escalation Vulnerability2018-10-17
CVE-2018-15395 — Improper Access Control in Cisco | cvebase