Cisco NX-OS Software TACACS+ or RADIUS Remote Authentication Directed Request DoS (cisco-sa-nxos-remoteauth-dos-XB6pv74m)

medium Nessus Plugin ID 180229

Synopsis

The remote device is missing a vendor-supplied security patch

Description

A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication attempt if the directed request option is enabled for TACACS+ or RADIUS. An attacker could exploit this vulnerability by entering a crafted string at the login prompt of an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a denial of service (DoS) condition.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCwe72368, CSCwe72648, CSCwe72670, CSCwe72673, CSCwe72674

See Also

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe72674

http://www.nessus.org/u?da4d94d6

http://www.nessus.org/u?d5b1feb9

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe72368

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe72648

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe72670

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwe72673

Plugin Details

Severity: Medium

ID: 180229

File Name: cisco-sa-nxos-remoteauth-dos-XB6pv74m.nasl

Version: 1.4

Type: combined

Family: CISCO

Published: 8/29/2023

Updated: 12/25/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:L/Au:S/C:N/I:N/A:C

CVSS Score Source: CVE-2023-20168

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Host/Cisco/NX-OS/Version, Host/Cisco/NX-OS/Model, Host/Cisco/NX-OS/Device

Exploit Ease: No known exploits are available

Patch Publication Date: 8/23/2023

Vulnerability Publication Date: 8/23/2023

Reference Information

CVE: CVE-2023-20168