First published: Wed Aug 23 2023(Updated: )
A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-nxos-remoteauth-dos-XB6pv74m is rated as high due to the potential for an affected device to unexpectedly reload.
To fix cisco-sa-nxos-remoteauth-dos-XB6pv74m, apply the latest patches or updates provided by Cisco for Cisco NX-OS Software.
Cisco NX-OS Software users who utilize TACACS+ and RADIUS remote authentication are affected by cisco-sa-nxos-remoteauth-dos-XB6pv74m.
cisco-sa-nxos-remoteauth-dos-XB6pv74m is caused by incorrect input validation when processing authentication requests.
No, cisco-sa-nxos-remoteauth-dos-XB6pv74m requires an unauthenticated local attacker to exploit the vulnerability.