First published: Fri Mar 06 2015(Updated: )
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.4\(1\)t | |
Cisco IOS | =15.4\(1\)t1 | |
Cisco IOS | =15.4\(1\)t2 | |
Cisco IOS | =15.4\(1\)t3 | |
Cisco IOS | =15.4\(1\)t4 | |
Cisco IOS | =15.4\(2\)t | |
Cisco IOS | =15.4\(2\)t1 | |
Cisco IOS | =15.4\(2\)t2 | |
Cisco IOS | =15.4\(2\)t3 | |
Cisco IOS | =15.4\(100\)t | |
Cisco IOS | =15.4t |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.