HOW To FIX CVE-2022-20695- A CRITICAL AUTHENTICATION BYPASS VULNERABILITY IN CISCO WLC

THESECMASTER

Recently, CISCO released patches to a critical vulnerability found in Wi-Fi LAN Controllers. This vulnerability could allow attackers to bypass authentication. Tracked as CVE-2022-20695, the vulnerability has a CVSS score of 10 out of 10 and allows an attacker to get control of an affected system.

1.About Cisco Wireless LAN Controller
2.Summary Of CVE-2022-20695
3.Cisco WLC Products Affected By This Authentication Bypass Vulnerability
4.Cisco WLC Products Not Affected By This Authentication Bypass Vulnerability
5.How To Fix CVE-2022-20695- A Critical Authentication Bypass Vulnerability In Cisco WLC?

Table f Contents :

Option 01: No Macfilters in the Environment
wlc > config macfilter radius-compat cisco

Option 02: Mac filter in the Environment
wlc > config macfilter radius-compat cisco
wlc > config macfilter radius-compat free

How To Apply The Workaround For CVE-2022-20695?

THESECMASTER

Tumblr

Telegram

Medium

Twitter

LinkedIn

Facebook

FOLLOW US:

THESECMASTER