CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:M/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
72.6%
The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | ios | 15.4(1)t | cpe:2.3:o:cisco:ios:15.4\(1\)t:*:*:*:*:*:*:* |
cisco | ios | 15.4(1)t1 | cpe:2.3:o:cisco:ios:15.4\(1\)t1:*:*:*:*:*:*:* |
cisco | ios | 15.4(1)t2 | cpe:2.3:o:cisco:ios:15.4\(1\)t2:*:*:*:*:*:*:* |
cisco | ios | 15.4(1)t3 | cpe:2.3:o:cisco:ios:15.4\(1\)t3:*:*:*:*:*:*:* |
cisco | ios | 15.4(1)t4 | cpe:2.3:o:cisco:ios:15.4\(1\)t4:*:*:*:*:*:*:* |
cisco | ios | 15.4(2)t | cpe:2.3:o:cisco:ios:15.4\(2\)t:*:*:*:*:*:*:* |
cisco | ios | 15.4(2)t1 | cpe:2.3:o:cisco:ios:15.4\(2\)t1:*:*:*:*:*:*:* |
cisco | ios | 15.4(2)t2 | cpe:2.3:o:cisco:ios:15.4\(2\)t2:*:*:*:*:*:*:* |
cisco | ios | 15.4(2)t3 | cpe:2.3:o:cisco:ios:15.4\(2\)t3:*:*:*:*:*:*:* |
cisco | ios | 15.4(100)t | cpe:2.3:o:cisco:ios:15.4\(100\)t:*:*:*:*:*:*:* |