CVE-2015-0607
06.03.2015, 03:00
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016.Enginsight
| Vendor | Product | Version |
|---|---|---|
| cisco | ios | 15.4\(1\)t |
| cisco | ios | 15.4\(1\)t1 |
| cisco | ios | 15.4\(1\)t2 |
| cisco | ios | 15.4\(1\)t3 |
| cisco | ios | 15.4\(1\)t4 |
| cisco | ios | 15.4\(2\)t |
| cisco | ios | 15.4\(2\)t1 |
| cisco | ios | 15.4\(2\)t2 |
| cisco | ios | 15.4\(2\)t3 |
| cisco | ios | 15.4\(100\)t |
| cisco | ios | 15.4t:t |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References