May 18, 2023, 3:15 a.m. |

National Vulnerability Database web.nvd.nist.gov

A vulnerability in the social login configuration option for the guest users of Cisco Business Wireless Access Points (APs) could allow an unauthenticated, adjacent attacker to bypass social login authentication. This vulnerability is due to a logic error with the social login implementation. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to access the Guest Portal without authentication.

access access points authentication business bypass cisco configuration cve error exploit guest users implementation logic login social vulnerability wireless

Information Security Engineers

@ D. E. Shaw Research | New York City

Strategic Portfolio Leader - Communications and Electronic Warfare

@ Babcock | Bristol, GB, BS16 1EJ

Senior Security Analyst (GRC)

@ ASOS | London, United Kingdom

Ingénieur(e) Réseaux et Firewalling Cybersécurité - Toulouse

@ Sopra Steria | Colomiers, France

Security Lead - Malaysia

@ Control Risks | Kuala Lumpur, Federal Territory of Kuala Lumpur, Malaysia

Cyber Security Engineer

@ Ecolab | IND-Bengaluru