Cisco IOS Software Command Security Bypass (cisco-sa-20120328-pai)

high Nessus Plugin ID 58570

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version and configuration, the Cisco IOS software running on the remote device is affected by a security bypass vulnerability in the Authentication, Authorization, and Accounting (AAA) feature. An authenticated, remote attacker can exploit this, via an HTTP or HTTPS session, to bypass access restrictions and execute any IOS command that is configured for the authorization level. This vulnerability requires that the HTTP or HTTPS server is enabled on the Cisco IOS device.

Solution

Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20120328-pai. Alternatively, the HTTP server may be disabled as a workaround.

See Also

http://www.nessus.org/u?1e254f1e

Plugin Details

Severity: High

ID: 58570

File Name: cisco-sa-20120328-pai.nasl

Version: 1.15

Type: combined

Family: CISCO

Published: 4/2/2012

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:M/Au:S/C:C/I:C/A:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 3/28/2012

Vulnerability Publication Date: 3/28/2012

Reference Information

CVE: CVE-2012-0384

BID: 52755

CISCO-SA: cisco-sa-20120328-pai

CISCO-BUG-ID: CSCtr91106