First published: Fri Mar 06 2015(Updated: )
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.4\(1\)t | |
Cisco IOS | =15.4\(1\)t1 | |
Cisco IOS | =15.4\(1\)t2 | |
Cisco IOS | =15.4\(1\)t3 | |
Cisco IOS | =15.4\(1\)t4 | |
Cisco IOS | =15.4\(2\)t | |
Cisco IOS | =15.4\(2\)t1 | |
Cisco IOS | =15.4\(2\)t2 | |
Cisco IOS | =15.4\(2\)t3 | |
Cisco IOS | =15.4\(100\)t | |
Cisco IOS | =15.4t |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0607 has a medium severity rating due to the potential for remote attackers to bypass authentication.
To remediate CVE-2015-0607, users should update to a patched version of Cisco IOS that addresses the authentication proxy vulnerability.
CVE-2015-0607 affects various versions of Cisco IOS, including 15.4(1)t, 15.4(1)t1, 15.4(1)t2, 15.4(1)t3, 15.4(1)t4, and others in the 15.4 series.
Yes, CVE-2015-0607 allows attackers to bypass authentication, enabling potential unauthorized access in specific circumstances.
While patching is the recommended solution for CVE-2015-0607, using strict access controls and monitoring may help mitigate the risk.