Lucene search

K
gentooGentoo FoundationGLSA-202402-13
HistoryFeb 18, 2024 - 12:00 a.m.

TACACS+: Remote Code Execution

2024-02-1800:00:00
Gentoo Foundation
security.gentoo.org
6
tacacs+ vulnerability
cisco server
remote code execution
input validation
shell commands

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

69.4%

Background

An updated version of Cisco’s TACACS+ server.

Description

A vulnerabilitiy has been discovered in TACACS+. Please review the CVE identifier referenced below for details.

Impact

A lack of input validation exists in tac_plus which, when pre or post auth commands are enabled, allows an attacker who can control the username, rem-addr, or NAC address sent to tac_plus to inject shell commands and gain remote code execution on the tac_plus server.

Workaround

There is no known workaround at this time.

Resolution

Gentoo has discontinued support for TACACS+. We recommend that users unmerge it:

 # emerge --ask --depclean "net-nds/tac_plus"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-nds/tac_plus<= 4.0.4.27a-r3UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

8.1 High

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

69.4%