Cisco has issued a security alert regarding a significant vulnerability (CVSS v3 score: 10.0) in the Wireless LAN Controller (WLC) software, which is tracked as CVE-2022-20695.
Remote attackers can use the management interface to log in to target devices without providing a valid password due to a security weakness.
The flaw is caused by an incorrect implementation of the password validation method, which allows non-default device settings to evade the regular authentication procedure.
If this condition is met, the attacker can exploit forged credentials to obtain access to various degrees of power, possibly all the way up to an administrative user.
Effects and redress
The products impacted by this problem, according to Cisco’s alert, are those that run Cisco WLC Software 8.10.151.0 or Release 8.10.162.0 and have “macfilter radius compatibility” set to “Other.”
The following items are affected:
Mobility Express Virtual Wireless Controller 3504 Wireless Controller 5520 Wireless Controller 8540 Wireless Controller (vWLC)
In addition to the foregoing, users that use the following builds that aren’t available through the Software Center should be aware that they are at risk: 8.10.151.4 to 8.10.151.10, and 8.10.162.1 to 8.10.162.14, respectively.
Finally, Cisco has certified that the following are not CVE-2022-20695 vulnerable:
Embedded Wireless Controller for Catalyst 9300, 9400, and 9500 Series Switches, Catalyst 9800
Wireless Controllers from the Catalyst 9800 Series
Wireless LAN Controller (WLC) AireOS devices not included in the Vulnerable Products section Catalyst 9800 Wireless Controller for Cloud Embedded Wireless Controller on Catalyst Access Points
Use the “display macfilter summary” command to see if your setup is susceptible. You’re exposed to assaults if the RADIUS compatibility mode returns “Other.”
No matter what configuration you’re using, applying Cisco’s latest available security patches (8.10.171.0 or later) will resolve this issue.
Alternatives that might be used
For individuals who are unable to upgrade the Wireless LAN Controller, Cisco has suggested two solutions.
The first approach is to use the command “config macfilter radius-compat cisco” to restore the “macfilter radius compatibility” mode to its default state.
The second alternative is to use the command “config macfilter radius-compat free” to modify the settings to other safe modes, such as “free.”
Cisco isn’t aware of the vulnerability being actively exploited at the time of writing, and Bleeping Computer hasn’t received any reports of scanning efforts either.