Cisco Access Point Software security bypass | CVE-2024-20265

NAME
__________
Cisco Access Point Software security bypass

Platforms Affected:
Cisco Aironet 1540 Series APs
Cisco Aironet 1560 Series APs
Cisco Aironet 1800 Series APs
Cisco Aironet 2800 Series APs
Cisco Aironet 3800 Series APs
Cisco Aironet 4800 APs
Cisco Business 100 Series APs and Mesh Extenders
Cisco Business 200 Series APs
Cisco 6300 Series Embedded Services APs (ESW6300)
Cisco Access Point Software
Cisco Catalyst 9115 APs
Cisco Catalyst IW6300 Heavy Duty Series APs
Cisco Wide Pluggable Form Factor Wi-Fi 6 AP Module for Industrial Routers
Cisco Catalyst 9105AX Series APs
Cisco Catalyst 9120AX Series APs
Cisco Catalyst 9124AX Series APs
Cisco Catalyst 9130AX Series APs
Cisco Catalyst 9136 Series APs
Cisco Catalyst Cellular Gateways

Risk Level:
5.9

Exploitability:
Unproven

Consequences:
Bypass Security

DESCRIPTION
__________

Cisco Access Point Software could allow a physical authenticated attacker to bypass security restrictions, caused by unnecessary commands are available during boot time at the physical console. By sending a specially crafted request, an attacker could exploit this vulnerability to bypass the Cisco Secure Boot validation checks and load an image.

CVSS 3.0 Information
__________

Privileges Required:
Low

User Interaction:
None

Scope:
Unchanged

Access Vector:
Physical


A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.

If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below

To keep up to date follow us on the below channels.