CVE-2017-12213

Published Sep 7, 2017

Last updated 5 years ago

Overview

Description
A vulnerability in the dynamic access control list (ACL) feature of Cisco IOS XE Software running on Cisco Catalyst 4000 Series Switches could allow an unauthenticated, adjacent attacker to cause dynamic ACL assignment to fail and the port to fail open. This could allow the attacker to pass traffic to the default VLAN of the affected port. The vulnerability is due to an uncaught error condition that may occur during the reassignment of the auth-default-ACL dynamic ACL to a switch port after 802.1x authentication fails. A successful exploit of this issue could allow a physically adjacent attacker to bypass 802.1x authentication and cause the affected port to fail open, allowing the attacker to pass traffic to the default VLAN of the affected switch port. Cisco Bug IDs: CSCvc72751.
Source
ykramarz@cisco.com
NVD status
Modified

Risk scores

CVSS 3.0

Type
Primary
Base score
4.3
Impact score
1.4
Exploitability score
2.8
Vector string
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Severity
MEDIUM

CVSS 2.0

Type
Primary
Base score
3.3
Impact score
2.9
Exploitability score
6.5
Vector string
AV:A/AC:L/Au:N/C:N/I:P/A:N

Weaknesses

nvd@nist.gov
CWE-287
ykramarz@cisco.com
CWE-287

Social media

Hype score
Not currently trending

Configurations