Apr 19, 2022
On Friday, April 15th, Cisco released an advisory to warn of the vulnerability tracked as CVE 2022-20695 (CVSS V3 Score 10.0)
The bug allows threat actors to login to the management console/interface of the wireless LAN controllers without a valid password- which gives access to the access points as well.
The affected products run on Cisco WLC software 18.104.22.168 or Release 22.214.171.124 and have macfilter radius capability configured as “other” and are listed below:
3504 Wireless Controller
5520 Wireless Controller
8540 Wireless Controller
Virtual Wireless Controller (vWLC)
Cisco has also warned customers using 126.96.36.199 to 188.8.131.52 and 184.108.40.206 to 220.127.116.11 builds, not available through the Software Center, should also consider themselves vulnerable.
Updating to the latest security release, 8.10.1717.0 or later should address the vulnerability. Cisco has provided two workarounds for those who cannot update immediately. The options are listed below.
reset the "macfilter radius compatibility" mode to the default by using the command: "config macfilter radius-compat cisco".
change the configuration to other safe modes, such as "free", using this command: "config macfilter radius-compat free"