Lucene search

K
ciscoCiscoCISCO-SA-20070105-CVE-2006-4097
HistoryJan 05, 2007 - 11:22 p.m.

Cisco Secure Access Control Server Access-Request Handling Denial of Service Vulnerability

2007-01-0523:22:58
tools.cisco.com
18

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.022

Percentile

89.6%

Cisco Secure Access Control Server for Windows and Cisco Secure Access Control Server Solution Engine contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.

This vulnerability exists due to insufficient handling of malformed RADIUS Access-Request messages. An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted RADIUS Access-Request network packet to an affected system, crashing the CSRadius process. This renders the system unresponsive to further RADIUS Authentication, Authorization, and Accounting requests.

Cisco has confirmed this vulnerability in a security advisory and released updated software to correct it.

To exploit this vulnerability, an attacker requires no special authentication credentials and requires no access to shared RADIUS keys. To accomplish an exploit, an attacker needs to send a crafted network request to an affected system. This likely requires the attacker to have access to trusted, internal networks or to be within range of wireless access. In the event of an exploit, attackers can render RADIUS systems unresponsive, denying authentication services to authorized users. TACACS+ functionality will still be operational, however.

Functional exploit code that proves the exploitability of this vulnerability is reported by the vendor but is not available publicly. However, because the viability of exploitation has been proven, attackers may
be more likely to develop exploit code.

Affected configurations

Vulners
Node
ciscoacs_for_windowsMatchany
OR
ciscosecure_access_control_server_solution_engineMatchany
OR
ciscoacs_for_windowsMatchany
OR
ciscosecure_access_control_server_solution_engineMatchany
VendorProductVersionCPE
ciscoacs_for_windowsanycpe:2.3:a:cisco:acs_for_windows:any:*:*:*:*:*:*:*
ciscosecure_access_control_server_solution_engineanycpe:2.3:h:cisco:secure_access_control_server_solution_engine:any:*:*:*:*:*:*:*

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.022

Percentile

89.6%

Related for CISCO-SA-20070105-CVE-2006-4097