The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote malicious users to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco ios 15.4\\(2\\)t2 |
||
cisco ios 15.4\\(2\\)t3 |
||
cisco ios 15.4\\(1\\)t |
||
cisco ios 15.4\\(1\\)t1 |
||
cisco ios 15.4\\(1\\)t2 |
||
cisco ios 15.4\\(1\\)t3 |
||
cisco ios 15.4t |
||
cisco ios 15.4\\(1\\)t4 |
||
cisco ios 15.4\\(2\\)t |
||
cisco ios 15.4\\(100\\)t |
||
cisco ios 15.4\\(2\\)t1 |