CVE-2024-20510 - Incorrect Authorization

Severity

93%

Complexity

27%

Confidentiality

96%

A vulnerability in the Central Web Authentication (CWA) feature of Cisco IOS XE Software for Wireless Controllers could allow an unauthenticated, adjacent attacker to bypass the pre-authentication access control list (ACL), which could allow access to network resources before user authentication. This vulnerability is due to a logic error when activating the pre-authentication ACL that is received from the authentication, authorization, and accounting (AAA) server. An attacker could exploit this vulnerability by connecting to a wireless network that is configured for CWA and sending traffic through an affected device that should be denied by the configured ACL before user authentication. A successful exploit could allow the attacker to bypass configured ACL protections on the affected device before the user authentication is completed, allowing the attacker to access trusted networks that the device might be protecting.

CVSS 3.1 Base Score 9.3. CVSS Attack Vector: adjacent_network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N).

Demo Examples

Incorrect Authorization

CWE-863

The following code could be for a medical records application. It displays a record to already authenticated users, confirming the user's authorization using a value stored in a cookie.


               
}
}
setcookie("role", $role, time()+60*60*2);
die("\n");
DisplayMedicalHistory($_POST['patient_ID']);
die("You are not Authorized to view this record\n");

The programmer expects that the cookie will only be set when getRole() succeeds. The programmer even diligently specifies a 2-hour expiration for the cookie. However, the attacker can easily set the "role" cookie to the value "Reader". As a result, the $role variable is "Reader", and getRole() is never invoked. The attacker has bypassed the authorization system.

Overview

Type

Cisco IOS

First reported 4 months ago

2024-09-25 17:15:00

Last updated 4 months ago

2024-10-03 14:52:00

Affected Software

Cisco IOS XE 16.5.1

16.5.1

Cisco IOS XE 16.3.4

16.3.4

Cisco IOS XE 16.5.1B

16.5.1b

Cisco IOS XE 16.4.2

16.4.2

Cisco IOS XE16.9.1

16.9.1

Cisco IOS XE 16.3.5

16.3.5

Cisco IOS XE 16.5.2

16.5.2

Cisco IOS XE 16.8.1A

16.8.1a

Cisco IOS XE 16.8.1S

16.8.1s

Cisco IOS XE 16.8.1B

16.8.1b

Cisco IOS XE 16.8.2

16.8.2

Cisco IOS XE 16.8.1D

16.8.1d

Cisco IOS XE 16.7.3

16.7.3

Cisco IOS XE 16.7.1A

16.7.1a

Cisco IOS XE 16.7.1B

16.7.1b

Cisco IOS XE 16.8.1C

16.8.1c

Cisco IOS XE 16.8.1E

16.8.1e

Cisco IOS XE 16.4.3

16.4.3

Cisco IOS XE 16.9.1S

16.9.1s

Cisco IOS XE 16.9.1B

16.9.1b

Cisco IOS XE 16.5.3

16.5.3

Cisco IOS XE 16.3.7

16.3.7

Cisco IOS XE 16.3.8

16.3.8

Cisco IOS XE 16.6.4

16.6.4

Cisco IOS XE 16.10.1

16.10.1

Cisco IOS XE 16.7.4

16.7.4

Cisco IOS XE 16.9.1A

16.9.1a

Cisco IOS XE 16.9.2

16.9.2

Cisco IOS XE 16.6.4A

16.6.4a

Cisco IOS XE 16.12.1

16.12.1

Cisco IOS XE 16.11.1

16.11.1

Cisco IOS XE 17.1.1

17.1.1

Cisco IOS XE 16.10.1S

16.10.1s

Cisco IOS XE 16.10.1D

16.10.1d

Cisco IOS XE 16.6.6

16.6.6

Cisco IOS XE 16.6.5A

16.6.5a

Cisco IOS XE 16.9.3A

16.9.3a

Cisco IOS XE 16.10.1A

16.10.1a

Cisco IOS XE 16.10.1F

16.10.1f

Cisco IOS XE 16.10.1G

16.10.1g

Cisco IOS XE 16.10.2

16.10.2

Cisco IOS XE 16.9.3

16.9.3

Cisco IOS XE 16.12.1Y

16.12.1y

Cisco IOS XE 16.10.1E

16.10.1e

Cisco IOS XE 16.10.1B

16.10.1b

Cisco IOS XE 16.8.3

16.8.3

Cisco IOS XE 16.10.1C

16.10.1c

Cisco IOS XE 16.12.2

16.12.2

Cisco IOS XE 16.12.2A

16.12.2a

Cisco IOS XE 16.10.3

16.10.3

Cisco IOS XE 16.12.4

16.12.4

Cisco IOS XE 16.12.8

16.12.8

Cisco IOS XE 16.9.5

16.9.5

Cisco IOS XE 16.9.5F

16.9.5f

Cisco IOS XE 16.6.8

16.6.8

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.