Lucene search

K
ciscoCiscoCISCO-SA-20150303-CVE-2015-0607
HistoryMar 03, 2015 - 9:56 p.m.

Cisco IOS Software Authentication Proxy Bypass Vulnerability

2015-03-0321:56:08
tools.cisco.com
17

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

EPSS

0.004

Percentile

72.6%

A vulnerability in the Authentication Proxy feature of Cisco IOS Software could allow a remote attacker to bypass the authentication.

The vulnerability is due to the incorrect processing of unsupported Authentication, Authorization, and Accounting (AAA) return codes from the AAA feature by the Authentication Proxy. An attacker could exploit this vulnerability by, for example, connecting with an empty password and hoping that the AAA server (RADIUS or TACACS+) will reply to Cisco IOS with a code that is not supported by the Authentication Proxy feature.

Cisco has confirmed the vulnerability in a security notice and released software updates.

A successful exploit could allow the attacker the ability to authenticate to a targeted device by using a blank password, which could allow the attacker the ability to conduct further attacks.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscoiosMatchany
OR
ciscoiosMatchany
VendorProductVersionCPE
ciscoiosanycpe:2.3:o:cisco:ios:any:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

EPSS

0.004

Percentile

72.6%

Related for CISCO-SA-20150303-CVE-2015-0607