Cisco IOS ACL Bypass (Bug ID CSCdi36962)

high Nessus Network Monitor Plugin ID 2198

Synopsis

The remote host may allow unauthorized traffic to pass, despite configured access controls.

Description

The remote system appears to be vulnerable to a flaw in IOS when the keyword 'tacacs-ds' or 'tacacs' is being used in extended ACLs. This bug can, under very specific circumstances and only with certain IP host implementations, allow unauthorized packets to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID CSCdi36962.

Solution

http://www.cisco.com/warp/public/707/1.html

Plugin Details

Severity: High

ID: 2198

Family: SNMP

Published: 9/3/2004

Updated: 3/6/2019

Nessus ID: 10974

Risk Information

VPR

Risk Factor: Medium

Score: 6.1

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Reference Information

CVE: CVE-1999-0161

BID: 703