Language:
Severity: Critical
ID: 160089
File Name: cisco-sa-wlc-auth-bypass-JRNhV4fF.nasl
Version: 1.8
Type: combined
Family: CISCO
Published: 4/22/2022
Updated: 5/14/2024
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Risk Factor: Medium
Score: 6.5
Risk Factor: High
Base Score: 9.3
Temporal Score: 6.9
Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2022-20695
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CPE: cpe:/o:cisco:wireless_lan_controller_software, cpe:/h:cisco:wireless_lan_controller
Required KB Items: Settings/ParanoidReport, Host/Cisco/WLC/Version, Host/Cisco/WLC/Port
Exploit Ease: No known exploits are available
Patch Publication Date: 4/13/2022
Vulnerability Publication Date: 4/13/2022
CVE: CVE-2022-20695