First published: Wed Sep 26 2018(Updated: )
A vulnerability in the TACACS+ client subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper handling of crafted TACACS+ response packets by the affected software. An attacker could exploit this vulnerability by injecting a crafted TACACS+ packet into an existing TACACS+ session between an affected device and a TACACS+ server or by impersonating a known, valid TACACS+ server and sending a crafted TACACS+ packet to an affected device when establishing a connection to the device. To exploit this vulnerability by using either method, the attacker must know the shared TACACS+ secret and the crafted packet must be sent in response to a TACACS+ request from a TACACS+ client. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-tacplus
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20180926-tacplus is classified as a denial of service (DoS) vulnerability.
To fix cisco-sa-20180926-tacplus, update the affected Cisco IOS Software or Cisco IOS XE Software to the latest recommended version.
Devices running vulnerable versions of Cisco IOS Software and Cisco IOS XE Software are affected by cisco-sa-20180926-tacplus.
An unauthenticated remote attacker can trigger a reload of the device, leading to a denial of service (DoS) condition using cisco-sa-20180926-tacplus.
Yes, cisco-sa-20180926-tacplus can be exploited remotely by an attacker without authentication.