First published: Wed Sep 22 2021(Updated: )
A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following: This vulnerability is due to an uninitialized variable. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aaa-Yx47ZT8Q This advisory is part of the September 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-aaa-Yx47ZT8Q is high due to the potential for unauthorized access.
To fix cisco-sa-aaa-Yx47ZT8Q, upgrade to a released version of Cisco IOS XE Software that addresses this vulnerability.
Organizations using Cisco IOS XE Software are affected by the cisco-sa-aaa-Yx47ZT8Q vulnerability.
With cisco-sa-aaa-Yx47ZT8Q, an attacker could bypass authentication to execute unauthorized commands.
Currently, there are no documented workarounds for the cisco-sa-aaa-Yx47ZT8Q vulnerability.