CVE-2015-0607
06.03.2015, 03:00
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | ios | 15.4\(1\)t |
cisco | ios | 15.4\(1\)t1 |
cisco | ios | 15.4\(1\)t2 |
cisco | ios | 15.4\(1\)t3 |
cisco | ios | 15.4\(1\)t4 |
cisco | ios | 15.4\(2\)t |
cisco | ios | 15.4\(2\)t1 |
cisco | ios | 15.4\(2\)t2 |
cisco | ios | 15.4\(2\)t3 |
cisco | ios | 15.4\(100\)t |
cisco | ios | 15.4t:t |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References