The Authentication Proxy feature in Cisco IOS does not properly handle invalid AAA return codes from RADIUS and TACACS+ servers, which allows remote attackers to bypass authentication in opportunistic circumstances via a connection attempt that triggers an invalid code, as demonstrated by a connection attempt with a blank password, aka Bug IDs CSCuo09400 and CSCun16016.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://www.securityfocus.com/bid/72794 | vdb entry |
http://www.securitytracker.com/id/1031817 | vdb entry |
http://tools.cisco.com/security/center/viewAlert.x?alertId=37711 | vendor advisory |
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2015-0607 | vendor advisory |