A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an unauthenticated, adjacent attacker to force the downgrade of the encryption algorithm that is used between an authenticator (access point) and a supplicant (Wi-Fi client). The vulnerability is due to the improper processing of certain EAPOL messages that are received during the Wi-Fi handshake process. An attacker could exploit this vulnerability by establishing a man-in-the-middle position between a supplicant and an authenticator and manipulating an EAPOL message exchange to force usage of a WPA-TKIP cipher instead of the more secure AES-CCMP cipher. A successful exploit could allow the attacker to conduct subsequent cryptographic attacks, which could lead to the disclosure of confidential information. Cisco Bug IDs: CSCvj29229.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Wap121
Subscribe
Wap121 Firmware
Subscribe
Wap125
Subscribe
Wap125 Firmware
Subscribe
Wap131
Subscribe
Wap131 Firmware
Subscribe
Wap150
Subscribe
Wap150 Firmware
Subscribe
Wap321
Subscribe
Wap321 Firmware
Subscribe
Wap351
Subscribe
Wap351 Firmware
Subscribe
Wap361
Subscribe
Wap361 Firmware
Subscribe
Wap371
Subscribe
Wap371 Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2018-1235 | A vulnerability in the implementation of Extensible Authentication Protocol over LAN (EAPOL) functionality in Cisco Small Business 100 Series Wireless Access Points and Cisco Small Business 300 Series Wireless Access Points could allow an unauthenticated, adjacent attacker to force the downgrade of the encryption algorithm that is used between an authenticator (access point) and a supplicant (Wi-Fi client). The vulnerability is due to the improper processing of certain EAPOL messages that are received during the Wi-Fi handshake process. An attacker could exploit this vulnerability by establishing a man-in-the-middle position between a supplicant and an authenticator and manipulating an EAPOL message exchange to force usage of a WPA-TKIP cipher instead of the more secure AES-CCMP cipher. A successful exploit could allow the attacker to conduct subsequent cryptographic attacks, which could lead to the disclosure of confidential information. Cisco Bug IDs: CSCvj29229. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 26 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-26T14:47:53.377Z
Reserved: 2017-11-27T00:00:00.000Z
Link: CVE-2018-0412
Updated: 2024-08-05T03:21:15.608Z
Status : Modified
Published: 2018-08-15T20:29:00.767
Modified: 2024-11-21T03:38:10.520
Link: CVE-2018-0412
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD