First published: Wed Mar 28 2018(Updated: )
A vulnerability in the 802.1x multiple-authentication (multi-auth) feature of Cisco IOS Software could allow an unauthenticated, adjacent attacker to bypass the authentication phase on an 802.1x multi-auth port. The vulnerability is due to a logic change error introduced into the code. An attacker could exploit this vulnerability by trying to access an 802.1x multi-auth port after a successful supplicant has authenticated. An exploit could allow the attacker to bypass the 802.1x access controls and obtain access to the network. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dot1x
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Cisco IOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of Cisco-SA-20180328-DOT1X is high due to its ability to allow unauthenticated access to the network.
To fix Cisco-SA-20180328-DOT1X, update to the latest version of Cisco IOS Software that addresses this vulnerability.
Devices running vulnerable versions of Cisco IOS Software with 802.1x multi-auth feature are affected by Cisco-SA-20180328-DOT1X.
Yes, Cisco-SA-20180328-DOT1X can potentially lead to data breaches by allowing attackers to bypass authentication.
An adjacent attacker can exploit Cisco-SA-20180328-DOT1X to gain unauthorized access to the network.