Vulnerabilities > CVE-2005-2105 - Unspecified vulnerability in Cisco IOS
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN cisco
nessus
Summary
Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username.
Vulnerable Configurations
Nessus
NASL family CISCO NASL id CISCO-SA-20050629-AAA.NASL description Remote Authentication Dial In User Service (RADIUS) authentication on a device that is running certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback method to none can be bypassed. Systems that are configured for other authentication methods or that are not configured with a fallback method to none are not affected. Only the systems that are running certain versions of Cisco IOS are affected. Not all configurations using RADIUS and none are vulnerable to this issue. Some configurations using RADIUS, none and an additional method are not affected. Cisco has made free software available to address this vulnerability. There are workarounds available to mitigate the effects of the vulnerability. The vulnerabilities are documented as the following Cisco Bug ID: CSCee45312 -- Radius authentication bypass when configured with a none fallback method. last seen 2020-03-17 modified 2010-09-01 plugin id 48986 published 2010-09-01 reporter This script is Copyright (C) 2010-2018 and is owned by Tenable, Inc. or an Affiliate thereof.. source https://www.tenable.com/plugins/nessus/48986 title RADIUS Authentication Bypass (cisco-sa-20050629-aaa) code #TRUSTED 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 # # (C) Tenable Network Security, Inc. # # The descriptive text and package checks in this plugin were # extracted from Cisco Security Advisory cisco-sa-20050629-aaa. # The text itself is copyright (C) Cisco # include("compat.inc"); if (description) { script_id(48986); script_version("1.16"); script_set_attribute(attribute:"plugin_modification_date", value:"2018/12/05"); script_cve_id("CVE-2005-2105"); script_xref(name:"CISCO-BUG-ID", value:"CSCee45312"); script_xref(name:"CISCO-SA", value:"cisco-sa-20050629-aaa"); script_name(english:"RADIUS Authentication Bypass (cisco-sa-20050629-aaa)"); script_summary(english:"Checks the IOS version."); script_set_attribute( attribute:"synopsis", value:"The remote device is missing a vendor-supplied security patch." ); script_set_attribute( attribute:"description", value: "Remote Authentication Dial In User Service (RADIUS) authentication on a device that is running certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback method to none can be bypassed. Systems that are configured for other authentication methods or that are not configured with a fallback method to none are not affected. Only the systems that are running certain versions of Cisco IOS are affected. Not all configurations using RADIUS and none are vulnerable to this issue. Some configurations using RADIUS, none and an additional method are not affected. Cisco has made free software available to address this vulnerability. There are workarounds available to mitigate the effects of the vulnerability. The vulnerabilities are documented as the following Cisco Bug ID: CSCee45312 -- Radius authentication bypass when configured with a none fallback method." ); # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20050629-aaa script_set_attribute( attribute:"see_also", value:"http://www.nessus.org/u?7970a950" ); script_set_attribute( attribute:"solution", value: "Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20050629-aaa." ); script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"); script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"); script_set_attribute(attribute:"cvss_score_source", value:"CVE-2005-2105"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios"); script_set_attribute(attribute:"vuln_publication_date", value:"2005/06/29"); script_set_attribute(attribute:"patch_publication_date", value:"2013/02/13"); script_set_attribute(attribute:"plugin_publication_date", value:"2010/09/01"); script_end_attributes(); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2010-2018 and is owned by Tenable, Inc. or an Affiliate thereof.."); script_family(english:"CISCO"); script_dependencies("cisco_ios_version.nasl"); script_require_keys("Host/Cisco/IOS/Version"); exit(0); } include("audit.inc"); include("cisco_func.inc"); include("cisco_kb_cmd_func.inc"); flag = 0; version = get_kb_item_or_exit("Host/Cisco/IOS/Version"); override = 0; if ( version == '12.2(1)MB1' ) flag++; if ( version == '12.2(1)XD' ) flag++; if ( version == '12.2(1)XD1' ) flag++; if ( version == '12.2(1)XD2' ) flag++; if ( version == '12.2(1)XD3' ) flag++; if ( version == '12.2(1)XD4' ) flag++; if ( version == '12.2(1)XE' ) flag++; if ( version == '12.2(1)XE1' ) flag++; if ( version == '12.2(1)XE2' ) flag++; if ( version == '12.2(11)BC1' ) flag++; if ( version == '12.2(11)BC1a' ) flag++; if ( version == '12.2(11)BC1b' ) flag++; if ( version == '12.2(11)BC2' ) flag++; if ( version == '12.2(11)BC2a' ) flag++; if ( version == '12.2(11)BC3' ) flag++; if ( version == '12.2(11)BC3a' ) flag++; if ( version == '12.2(11)BC3b' ) flag++; if ( version == '12.2(11)BC3c' ) flag++; if ( version == '12.2(11)BC3d' ) flag++; if ( version == '12.2(11)CX' ) flag++; if ( version == '12.2(11)CY' ) flag++; if ( version == '12.2(11)JA' ) flag++; if ( version == '12.2(11)JA1' ) flag++; if ( version == '12.2(11)JA2' ) flag++; if ( version == '12.2(11)JA3' ) flag++; if ( version == '12.2(11)T' ) flag++; if ( version == '12.2(11)T1' ) flag++; if ( version == '12.2(11)T10' ) flag++; if ( version == '12.2(11)T11' ) flag++; if ( version == '12.2(11)T2' ) flag++; if ( version == '12.2(11)T3' ) flag++; if ( version == '12.2(11)T4' ) flag++; if ( version == '12.2(11)T5' ) flag++; if ( version == '12.2(11)T6' ) flag++; if ( version == '12.2(11)T8' ) flag++; if ( version == '12.2(11)T9' ) flag++; if ( version == '12.2(11)YP3' ) flag++; if ( version == '12.2(11)YQ' ) flag++; if ( version == '12.2(11)YR' ) flag++; if ( version == '12.2(11)YT' ) flag++; if ( version == '12.2(11)YT1' ) flag++; if ( version == '12.2(11)YT2' ) flag++; if ( version == '12.2(11)YU' ) flag++; if ( version == '12.2(11)YV' ) flag++; if ( version == '12.2(11)YV1' ) flag++; if ( version == '12.2(11)ZC' ) flag++; if ( version == '12.2(13)JA' ) flag++; if ( version == '12.2(13)JA1' ) flag++; if ( version == '12.2(13)JA2' ) flag++; if ( version == '12.2(13)JA3' ) flag++; if ( version == '12.2(13)JA4' ) flag++; if ( version == '12.2(13)T' ) flag++; if ( version == '12.2(13)T1' ) flag++; if ( version == '12.2(13)T10' ) flag++; if ( version == '12.2(13)T11' ) flag++; if ( version == '12.2(13)T12' ) flag++; if ( version == '12.2(13)T13' ) flag++; if ( version == '12.2(13)T14' ) flag++; if ( version == '12.2(13)T16' ) flag++; if ( version == '12.2(13)T1a' ) flag++; if ( version == '12.2(13)T2' ) flag++; if ( version == '12.2(13)T3' ) flag++; if ( version == '12.2(13)T4' ) flag++; if ( version == '12.2(13)T5' ) flag++; if ( version == '12.2(13)T8' ) flag++; if ( version == '12.2(13)T9' ) flag++; if ( version == '12.2(13)ZC' ) flag++; if ( version == '12.2(13)ZD' ) flag++; if ( version == '12.2(13)ZD1' ) flag++; if ( version == '12.2(13)ZD2' ) flag++; if ( version == '12.2(13)ZD3' ) flag++; if ( version == '12.2(13)ZD4' ) flag++; if ( version == '12.2(13)ZE' ) flag++; if ( version == '12.2(13)ZF' ) flag++; if ( version == '12.2(13)ZF1' ) flag++; if ( version == '12.2(13)ZF2' ) flag++; if ( version == '12.2(13)ZG' ) flag++; if ( version == '12.2(13)ZH' ) flag++; if ( version == '12.2(13)ZH1' ) flag++; if ( version == '12.2(13)ZH2' ) flag++; if ( version == '12.2(13)ZH3' ) flag++; if ( version == '12.2(13)ZH4' ) flag++; if ( version == '12.2(13)ZH5' ) flag++; if ( version == '12.2(13)ZH6' ) flag++; if ( version == '12.2(13)ZH7' ) flag++; if ( version == '12.2(13)ZP' ) flag++; if ( version == '12.2(13)ZP1' ) flag++; if ( version == '12.2(13)ZP2' ) flag++; if ( version == '12.2(13)ZP3' ) flag++; if ( version == '12.2(13)ZP4' ) flag++; if ( version == '12.2(15)B' ) flag++; if ( version == '12.2(15)BC1' ) flag++; if ( version == '12.2(15)BC1a' ) flag++; if ( version == '12.2(15)BC1b' ) flag++; if ( version == '12.2(15)BC1c' ) flag++; if ( version == '12.2(15)BC1d' ) flag++; if ( version == '12.2(15)BC1e' ) flag++; if ( version == '12.2(15)BC1f' ) flag++; if ( version == '12.2(15)BC1g' ) flag++; if ( version == '12.2(15)BC2' ) flag++; if ( version == '12.2(15)BC2a' ) flag++; if ( version == '12.2(15)BC2b' ) flag++; if ( version == '12.2(15)BC2c' ) flag++; if ( version == '12.2(15)BC2d' ) flag++; if ( version == '12.2(15)BC2e' ) flag++; if ( version == '12.2(15)BC2f' ) flag++; if ( version == '12.2(15)BC2g' ) flag++; if ( version == '12.2(15)BC2h' ) flag++; if ( version == '12.2(15)BC2i' ) flag++; if ( version == '12.2(15)BX' ) flag++; if ( version == '12.2(15)BZ2' ) flag++; if ( version == '12.2(15)CX' ) flag++; if ( version == '12.2(15)CX1' ) flag++; if ( version == '12.2(15)CZ' ) flag++; if ( version == '12.2(15)CZ1' ) flag++; if ( version == '12.2(15)CZ2' ) flag++; if ( version == '12.2(15)CZ3' ) flag++; if ( version == '12.2(15)JA' ) flag++; if ( version == '12.2(15)JK' ) flag++; if ( version == '12.2(15)JK1' ) flag++; if ( version == '12.2(15)JK2' ) flag++; if ( version == '12.2(15)JK3' ) flag++; if ( version == '12.2(15)JK4' ) flag++; if ( version == '12.2(15)MC1' ) flag++; if ( version == '12.2(15)MC1a' ) flag++; if ( version == '12.2(15)MC1b' ) flag++; if ( version == '12.2(15)MC1c' ) flag++; if ( version == '12.2(15)MC2' ) flag++; if ( version == '12.2(15)MC2a' ) flag++; if ( version == '12.2(15)MC2b' ) flag++; if ( version == '12.2(15)MC2c' ) flag++; if ( version == '12.2(15)MC2e' ) flag++; if ( version == '12.2(15)MC2f' ) flag++; if ( version == '12.2(15)MC2g' ) flag++; if ( version == '12.2(15)T' ) flag++; if ( version == '12.2(15)T1' ) flag++; if ( version == '12.2(15)T10' ) flag++; if ( version == '12.2(15)T11' ) flag++; if ( version == '12.2(15)T12' ) flag++; if ( version == '12.2(15)T13' ) flag++; if ( version == '12.2(15)T14' ) flag++; if ( version == '12.2(15)T15' ) flag++; if ( version == '12.2(15)T16' ) flag++; if ( version == '12.2(15)T2' ) flag++; if ( version == '12.2(15)T4' ) flag++; if ( version == '12.2(15)T4e' ) flag++; if ( version == '12.2(15)T5' ) flag++; if ( version == '12.2(15)T7' ) flag++; if ( version == '12.2(15)T8' ) flag++; if ( version == '12.2(15)T9' ) flag++; if ( version == '12.2(15)XR' ) flag++; if ( version == '12.2(15)XR1' ) flag++; if ( version == '12.2(15)XR2' ) flag++; if ( version == '12.2(15)ZJ' ) flag++; if ( version == '12.2(15)ZJ1' ) flag++; if ( version == '12.2(15)ZJ2' ) flag++; if ( version == '12.2(15)ZJ3' ) flag++; if ( version == '12.2(15)ZJ5' ) flag++; if ( version == '12.2(15)ZL' ) flag++; if ( version == '12.2(15)ZL1' ) flag++; if ( version == '12.2(16)B' ) flag++; if ( version == '12.2(16)B1' ) flag++; if ( version == '12.2(16)B2' ) flag++; if ( version == '12.2(16)BX' ) flag++; if ( version == '12.2(16)BX1' ) flag++; if ( version == '12.2(16)BX2' ) flag++; if ( version == '12.2(16)BX3' ) flag++; if ( version == '12.2(18)SXD' ) flag++; if ( version == '12.2(18)SXD1' ) flag++; if ( version == '12.2(18)SXD2' ) flag++; if ( version == '12.2(18)SXD3' ) flag++; if ( version == '12.2(18)SXD4' ) flag++; if ( version == '12.2(18)SXE' ) flag++; if ( version == '12.2(18)SXE1' ) flag++; if ( version == '12.2(2)BX' ) flag++; if ( version == '12.2(2)BX1' ) flag++; if ( version == '12.2(2)BY' ) flag++; if ( version == '12.2(2)BY1' ) flag++; if ( version == '12.2(2)BY2' ) flag++; if ( version == '12.2(2)BY3' ) flag++; if ( version == '12.2(2)XB1' ) flag++; if ( version == '12.2(2)XB10' ) flag++; if ( version == '12.2(2)XB11' ) flag++; if ( version == '12.2(2)XB12' ) flag++; if ( version == '12.2(2)XB14' ) flag++; if ( version == '12.2(2)XB15' ) flag++; if ( version == '12.2(2)XB2' ) flag++; if ( version == '12.2(2)XB3' ) flag++; if ( version == '12.2(2)XB5' ) flag++; if ( version == '12.2(2)XB6' ) flag++; if ( version == '12.2(2)XB7' ) flag++; if ( version == '12.2(2)XB8' ) flag++; if ( version == '12.2(2)XC' ) flag++; if ( version == '12.2(2)XC1' ) flag++; if ( version == '12.2(2)XC2' ) flag++; if ( version == '12.2(2)XG' ) flag++; if ( version == '12.2(2)XG1' ) flag++; if ( version == '12.2(2)XH' ) flag++; if ( version == '12.2(2)XH1' ) flag++; if ( version == '12.2(2)XH2' ) flag++; if ( version == '12.2(2)XI' ) flag++; if ( version == '12.2(2)XI1' ) flag++; if ( version == '12.2(2)XI2' ) flag++; if ( version == '12.2(2)XJ' ) flag++; if ( version == '12.2(2)XK' ) flag++; if ( version == '12.2(2)XK1' ) flag++; if ( version == '12.2(2)XK2' ) flag++; if ( version == '12.2(2)XK3' ) flag++; if ( version == '12.2(2)XQ' ) flag++; if ( version == '12.2(2)XQ1' ) flag++; if ( version == '12.2(2)XT' ) flag++; if ( version == '12.2(2)XT2' ) flag++; if ( version == '12.2(2)XT3' ) flag++; if ( version == '12.2(2)XU' ) flag++; if ( version == '12.2(2)YC' ) flag++; if ( version == '12.2(2)YC1' ) flag++; if ( version == '12.2(2)YC2' ) flag++; if ( version == '12.2(2)YC3' ) flag++; if ( version == '12.2(2)YC4' ) flag++; if ( version == '12.2(25)EW' ) flag++; if ( version == '12.2(25)EWA' ) flag++; if ( version == '12.2(25)EWA1' ) flag++; if ( version == '12.2(25)EY' ) flag++; if ( version == '12.2(25)EY1' ) flag++; if ( version == '12.2(25)EZ' ) flag++; if ( version == '12.2(25)EZ1' ) flag++; if ( version == '12.2(25)SE' ) flag++; if ( version == '12.2(25)SEA' ) flag++; if ( version == '12.2(25)SEB' ) flag++; if ( version == '12.2(25)SEB1' ) flag++; if ( version == '12.2(30)S' ) flag++; if ( version == '12.2(30)S1' ) flag++; if ( version == '12.2(4)B' ) flag++; if ( version == '12.2(4)B1' ) flag++; if ( version == '12.2(4)B2' ) flag++; if ( version == '12.2(4)B3' ) flag++; if ( version == '12.2(4)B4' ) flag++; if ( version == '12.2(4)B5' ) flag++; if ( version == '12.2(4)B6' ) flag++; if ( version == '12.2(4)B7' ) flag++; if ( version == '12.2(4)B8' ) flag++; if ( version == '12.2(4)BC1' ) flag++; if ( version == '12.2(4)BC1a' ) flag++; if ( version == '12.2(4)BC1b' ) flag++; if ( version == '12.2(4)BW' ) flag++; if ( version == '12.2(4)BW1' ) flag++; if ( version == '12.2(4)BW1a' ) flag++; if ( version == '12.2(4)BW2' ) flag++; if ( version == '12.2(4)BZ1' ) flag++; if ( version == '12.2(4)BZ2' ) flag++; if ( version == '12.2(4)JA' ) flag++; if ( version == '12.2(4)JA1' ) flag++; if ( version == '12.2(4)MB1' ) flag++; if ( version == '12.2(4)MB10' ) flag++; if ( version == '12.2(4)MB11' ) flag++; if ( version == '12.2(4)MB12' ) flag++; if ( version == '12.2(4)MB13' ) flag++; if ( version == '12.2(4)MB13a' ) flag++; if ( version == '12.2(4)MB13b' ) flag++; if ( version == '12.2(4)MB13c' ) flag++; if ( version == '12.2(4)MB2' ) flag++; if ( version == '12.2(4)MB3' ) flag++; if ( version == '12.2(4)MB4' ) flag++; if ( version == '12.2(4)MB5' ) flag++; if ( version == '12.2(4)MB6' ) flag++; if ( version == '12.2(4)MB7' ) flag++; if ( version == '12.2(4)MB8' ) flag++; if ( version == '12.2(4)MB9' ) flag++; if ( version == '12.2(4)MB9a' ) flag++; if ( version == '12.2(4)T' ) flag++; if ( version == '12.2(4)T1' ) flag++; if ( version == '12.2(4)T2' ) flag++; if ( version == '12.2(4)T3' ) flag++; if ( version == '12.2(4)T5' ) flag++; if ( version == '12.2(4)T6' ) flag++; if ( version == '12.2(4)T7' ) flag++; if ( version == '12.2(4)XF' ) flag++; if ( version == '12.2(4)XF1' ) flag++; if ( version == '12.2(4)XL' ) flag++; if ( version == '12.2(4)XL1' ) flag++; if ( version == '12.2(4)XL2' ) flag++; if ( version == '12.2(4)XL3' ) flag++; if ( version == '12.2(4)XL4' ) flag++; if ( version == '12.2(4)XL5' ) flag++; if ( version == '12.2(4)XL6' ) flag++; if ( version == '12.2(4)XM' ) flag++; if ( version == '12.2(4)XM1' ) flag++; if ( version == '12.2(4)XM2' ) flag++; if ( version == '12.2(4)XM3' ) flag++; if ( version == '12.2(4)XM4' ) flag++; if ( version == '12.2(4)XR' ) flag++; if ( version == '12.2(4)XV' ) flag++; if ( version == '12.2(4)XV1' ) flag++; if ( version == '12.2(4)XV2' ) flag++; if ( version == '12.2(4)XV3' ) flag++; if ( version == '12.2(4)XV4' ) flag++; if ( version == '12.2(4)XV4a' ) flag++; if ( version == '12.2(4)XV5' ) flag++; if ( version == '12.2(4)XW' ) flag++; if ( version == '12.2(4)YA' ) flag++; if ( version == '12.2(4)YA1' ) flag++; if ( version == '12.2(4)YA10' ) flag++; if ( version == '12.2(4)YA2' ) flag++; if ( version == '12.2(4)YA3' ) flag++; if ( version == '12.2(4)YA4' ) flag++; if ( version == '12.2(4)YA5' ) flag++; if ( version == '12.2(4)YA6' ) flag++; if ( version == '12.2(4)YA7' ) flag++; if ( version == '12.2(4)YA8' ) flag++; if ( version == '12.2(4)YA9' ) flag++; if ( version == '12.2(4)YB' ) flag++; if ( version == '12.2(4)YF' ) flag++; if ( version == '12.2(4)YG' ) flag++; if ( version == '12.2(4)YH' ) flag++; if ( version == '12.2(8)BC1' ) flag++; if ( version == '12.2(8)BC2' ) flag++; if ( version == '12.2(8)BC2a' ) flag++; if ( version == '12.2(8)BY' ) flag++; if ( version == '12.2(8)BY1' ) flag++; if ( version == '12.2(8)BY2' ) flag++; if ( version == '12.2(8)JA' ) flag++; if ( version == '12.2(8)MC1' ) flag++; if ( version == '12.2(8)MC2' ) flag++; if ( version == '12.2(8)MC2a' ) flag++; if ( version == '12.2(8)MC2b' ) flag++; if ( version == '12.2(8)MC2c' ) flag++; if ( version == '12.2(8)MC2d' ) flag++; if ( version == '12.2(8)T' ) flag++; if ( version == '12.2(8)T1' ) flag++; if ( version == '12.2(8)T10' ) flag++; if ( version == '12.2(8)T2' ) flag++; if ( version == '12.2(8)T3' ) flag++; if ( version == '12.2(8)T4' ) flag++; if ( version == '12.2(8)T5' ) flag++; if ( version == '12.2(8)T7' ) flag++; if ( version == '12.2(8)T8' ) flag++; if ( version == '12.2(8)YD' ) flag++; if ( version == '12.2(8)YD1' ) flag++; if ( version == '12.2(8)YD2' ) flag++; if ( version == '12.2(8)YD3' ) flag++; if ( version == '12.2(8)YJ' ) flag++; if ( version == '12.2(8)YJ1' ) flag++; if ( version == '12.2(8)YL' ) flag++; if ( version == '12.2(8)YM' ) flag++; if ( version == '12.2(8)YN' ) flag++; if ( version == '12.2(8)YN1' ) flag++; if ( version == '12.2(8)YW' ) flag++; if ( version == '12.2(8)YW1' ) flag++; if ( version == '12.2(8)YW2' ) flag++; if ( version == '12.2(8)YW3' ) flag++; if ( version == '12.2(8)YY' ) flag++; if ( version == '12.2(8)YY1' ) flag++; if ( version == '12.2(8)YY2' ) flag++; if ( version == '12.2(8)YY3' ) flag++; if ( version == '12.2(8)YY4' ) flag++; if ( version == '12.2(8)ZB' ) flag++; if ( version == '12.2(8)ZB1' ) flag++; if ( version == '12.2(8)ZB2' ) flag++; if ( version == '12.2(8)ZB3' ) flag++; if ( version == '12.2(8)ZB4' ) flag++; if ( version == '12.2(8)ZB4a' ) flag++; if ( version == '12.2(8)ZB5' ) flag++; if ( version == '12.2(8)ZB6' ) flag++; if ( version == '12.2(8)ZB7' ) flag++; if ( version == '12.2(8)ZB8' ) flag++; if ( version == '12.3(1)' ) flag++; if ( version == '12.3(1a)' ) flag++; if ( version == '12.3(1a)B' ) flag++; if ( version == '12.3(1a)BW' ) flag++; if ( version == '12.3(2)JA' ) flag++; if ( version == '12.3(2)JA1' ) flag++; if ( version == '12.3(2)JA2' ) flag++; if ( version == '12.3(2)JA5' ) flag++; if ( version == '12.3(2)T' ) flag++; if ( version == '12.3(2)T1' ) flag++; if ( version == '12.3(2)T2' ) flag++; if ( version == '12.3(2)T3' ) flag++; if ( version == '12.3(2)T4' ) flag++; if ( version == '12.3(2)T5' ) flag++; if ( version == '12.3(2)T6' ) flag++; if ( version == '12.3(2)T7' ) flag++; if ( version == '12.3(2)T8' ) flag++; if ( version == '12.3(2)T9' ) flag++; if ( version == '12.3(2)XA' ) flag++; if ( version == '12.3(2)XA1' ) flag++; if ( version == '12.3(2)XA2' ) flag++; if ( version == '12.3(2)XA3' ) flag++; if ( version == '12.3(2)XA4' ) flag++; if ( version == '12.3(2)XB' ) flag++; if ( version == '12.3(2)XB1' ) flag++; if ( version == '12.3(2)XB3' ) flag++; if ( version == '12.3(2)XC' ) flag++; if ( version == '12.3(2)XC1' ) flag++; if ( version == '12.3(2)XC2' ) flag++; if ( version == '12.3(2)XC3' ) flag++; if ( version == '12.3(2)XE' ) flag++; if ( version == '12.3(2)XE1' ) flag++; if ( version == '12.3(2)XE2' ) flag++; if ( version == '12.3(2)XE3' ) flag++; if ( version == '12.3(2)XF' ) flag++; if ( version == '12.3(2)XZ' ) flag++; if ( version == '12.3(2)XZ1' ) flag++; if ( version == '12.3(2)XZ2' ) flag++; if ( version == '12.3(3)' ) flag++; if ( version == '12.3(3)B' ) flag++; if ( version == '12.3(3)B1' ) flag++; if ( version == '12.3(3a)' ) flag++; if ( version == '12.3(3b)' ) flag++; if ( version == '12.3(3c)' ) flag++; if ( version == '12.3(3e)' ) flag++; if ( version == '12.3(3f)' ) flag++; if ( version == '12.3(3g)' ) flag++; if ( version == '12.3(3h)' ) flag++; if ( version == '12.3(4)JA' ) flag++; if ( version == '12.3(4)JA1' ) flag++; if ( version == '12.3(4)T' ) flag++; if ( version == '12.3(4)T1' ) flag++; if ( version == '12.3(4)T10' ) flag++; if ( version == '12.3(4)T11' ) flag++; if ( version == '12.3(4)T2' ) flag++; if ( version == '12.3(4)T2a' ) flag++; if ( version == '12.3(4)T3' ) flag++; if ( version == '12.3(4)T4' ) flag++; if ( version == '12.3(4)T6' ) flag++; if ( version == '12.3(4)T7' ) flag++; if ( version == '12.3(4)T8' ) flag++; if ( version == '12.3(4)T9' ) flag++; if ( version == '12.3(4)XD' ) flag++; if ( version == '12.3(4)XD1' ) flag++; if ( version == '12.3(4)XD2' ) flag++; if ( version == '12.3(4)XD3' ) flag++; if ( version == '12.3(4)XD4' ) flag++; if ( version == '12.3(4)XG' ) flag++; if ( version == '12.3(4)XG1' ) flag++; if ( version == '12.3(4)XG2' ) flag++; if ( version == '12.3(4)XG3' ) flag++; if ( version == '12.3(4)XG4' ) flag++; if ( version == '12.3(4)XK' ) flag++; if ( version == '12.3(4)XK1' ) flag++; if ( version == '12.3(4)XK2' ) flag++; if ( version == '12.3(4)XK3' ) flag++; if ( version == '12.3(4)XQ' ) flag++; if ( version == '12.3(4)XQ1' ) flag++; if ( version == '12.3(5)' ) flag++; if ( version == '12.3(5a)' ) flag++; if ( version == '12.3(5a)B' ) flag++; if ( version == '12.3(5a)B1' ) flag++; if ( version == '12.3(5a)B2' ) flag++; if ( version == '12.3(5a)B3' ) flag++; if ( version == '12.3(5a)B4' ) flag++; if ( version == '12.3(5a)B5' ) flag++; if ( version == '12.3(5b)' ) flag++; if ( version == '12.3(5c)' ) flag++; if ( version == '12.3(5d)' ) flag++; if ( version == '12.3(5e)' ) flag++; if ( version == '12.3(6)' ) flag++; if ( version == '12.3(6a)' ) flag++; if ( version == '12.3(6b)' ) flag++; if ( version == '12.3(6c)' ) flag++; if ( version == '12.3(6e)' ) flag++; if ( version == '12.3(7)T' ) flag++; if ( version == '12.3(7)T1' ) flag++; if ( version == '12.3(7)T10' ) flag++; if ( version == '12.3(7)T2' ) flag++; if ( version == '12.3(7)T3' ) flag++; if ( version == '12.3(7)T4' ) flag++; if ( version == '12.3(7)T6' ) flag++; if ( version == '12.3(7)T7' ) flag++; if ( version == '12.3(7)T8' ) flag++; if ( version == '12.3(7)T9' ) flag++; if ( version == '12.3(7)XI1' ) flag++; if ( version == '12.3(7)XI1b' ) flag++; if ( version == '12.3(7)XI1c' ) flag++; if ( version == '12.3(7)XI2' ) flag++; if ( version == '12.3(7)XI2a' ) flag++; if ( version == '12.3(7)XI3' ) flag++; if ( version == '12.3(7)XI4' ) flag++; if ( version == '12.3(7)XI5' ) flag++; if ( version == '12.3(7)XJ' ) flag++; if ( version == '12.3(7)XJ1' ) flag++; if ( version == '12.3(7)XJ2' ) flag++; if ( version == '12.3(7)XR' ) flag++; if ( version == '12.3(7)XR2' ) flag++; if ( version == '12.3(7)XR3' ) flag++; if ( version == '12.3(7)XR4' ) flag++; if ( version == '12.3(7)XS' ) flag++; if ( version == '12.3(7)XS1' ) flag++; if ( version == '12.3(7)XS2' ) flag++; if ( version == '12.3(8)T' ) flag++; if ( version == '12.3(8)T1' ) flag++; if ( version == '12.3(8)T3' ) flag++; if ( version == '12.3(8)XU' ) flag++; if ( version == '12.3(8)XU1' ) flag++; if ( version == '12.3(8)XU2' ) flag++; if ( version == '12.3(8)XU3' ) flag++; if ( version == '12.3(8)XU4' ) flag++; if ( version == '12.3(8)XU5' ) flag++; if ( version == '12.3(8)XW' ) flag++; if ( version == '12.3(8)XW1' ) flag++; if ( version == '12.3(8)XW2' ) flag++; if ( version == '12.3(8)XW3' ) flag++; if ( version == '12.3(8)XX' ) flag++; if ( version == '12.3(8)XX1' ) flag++; if ( version == '12.3(8)XY' ) flag++; if ( version == '12.3(8)XY1' ) flag++; if ( version == '12.3(8)XY2' ) flag++; if ( version == '12.3(8)XY3' ) flag++; if ( version == '12.3(8)XY4' ) flag++; if ( version == '12.3(8)YA' ) flag++; if ( version == '12.3(8)YA1' ) flag++; if ( version == '12.3(9)' ) flag++; if ( version == '12.3(9a)' ) flag++; if ( version == '12.3(9a)BC' ) flag++; if ( version == '12.3(9a)BC1' ) flag++; if ( version == '12.3(9a)BC2' ) flag++; if ( version == '12.3(9a)BC3' ) flag++; if ( version == '12.3(9a)BC4' ) flag++; if ( version == '12.3(9a)BC5' ) flag++; if ( version == '12.3(9a)BC6' ) flag++; if ( version == '12.3(9b)' ) flag++; if ( version == '12.3(9c)' ) flag++; if ( version == '12.3(9d)' ) flag++; if (get_kb_item("Host/local_checks_enabled")) { if (flag) { flag = 0; buf = cisco_command_kb_item("Host/Cisco/Config/show_running-config", "show running-config"); if (check_cisco_result(buf)) { if (preg(pattern:"aaa authentication login [^\r\n]+ group radius none", multiline:TRUE, string:buf)) { flag = 1; } if (preg(pattern:"aaa authentication ppp [^\r\n]+ group radius none", multiline:TRUE, string:buf)) { flag = 1; } if (preg(pattern:"aaa authentication login [^\r\n]'+ group radius local none", multiline:TRUE, string:buf)) { flag = 1; } if (preg(pattern:"aaa authentication ppp [^\r\n]+ group radius local none", multiline:TRUE, string:buf)) { flag = 1; } } else if (cisco_needs_enable(buf)) { flag = 1; override = 1; } } } if (flag) { security_hole(port:0, extra:cisco_caveat(override)); exit(0); } else audit(AUDIT_HOST_NOT, "affected");
NASL family CISCO NASL id CSCEE45312.NASL description The remote host is a CISCO router containing a version of IOS that contains a faulty RADIUS implementation which may lead to an authentication bypass vulnerability. An attacker may exploit this problem to gain unauthorized access to the service. last seen 2020-06-01 modified 2020-06-02 plugin id 20933 published 2006-02-17 reporter This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. source https://www.tenable.com/plugins/nessus/20933 title Cisco IOS AAA RADIUS Long Username Authentication Bypass (CSCee45312) code # # (C) Tenable Network Security, Inc. # include("compat.inc"); if(description) { script_id(20933); script_bugtraq_id(14092); script_cve_id("CVE-2005-2105"); script_version("1.17"); script_name(english:"Cisco IOS AAA RADIUS Long Username Authentication Bypass (CSCee45312)"); script_set_attribute(attribute:"synopsis", value: "The remote Cisco IOS RADIUS server is prone to a remote authentication bypass attack." ); script_set_attribute(attribute:"description", value: "The remote host is a CISCO router containing a version of IOS that contains a faulty RADIUS implementation which may lead to an authentication bypass vulnerability. An attacker may exploit this problem to gain unauthorized access to the service." ); script_set_attribute(attribute:"solution", value: "http://www.nessus.org/u?b981b4d9" ); script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P"); script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C"); script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available"); script_set_attribute(attribute:"exploit_available", value:"false"); script_set_attribute(attribute:"plugin_publication_date", value: "2006/02/17"); script_set_attribute(attribute:"vuln_publication_date", value: "2005/06/29"); script_cvs_date("Date: 2018/06/27 18:42:25"); script_set_attribute(attribute:"plugin_type", value:"local"); script_set_attribute(attribute:"cpe", value: "cpe:/o:cisco:ios"); script_end_attributes(); summary["english"] = "Uses SNMP to determine if a flaw is present"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc."); script_family(english:"CISCO"); script_dependencie("snmp_sysDesc.nasl", "snmp_cisco_type.nasl"); script_require_keys("SNMP/community", "SNMP/sysDesc", "CISCO/model"); exit(0); } include('cisco_func.inc'); os = get_kb_item("SNMP/sysDesc"); if(!os)exit(0); hardware = get_kb_item("CISCO/model"); if(!hardware)exit(0); version = extract_version(os); if ( ! version ) exit(0); # 12.2 if ( deprecated_version(version, "12.2B", "12.2BC", "12.2BW", "12.2BX", "12.2BY", "12.2BZ", "12.2CX", "12.2CY", "12.2CZ", "12.2EW", "12.2EZ", "12.2JA", "12.2MB", "12.2MC", "12.2MX", "12.2T", "12.2XB", "12.2XC", "12.2XD", "12.2XE", "12.2XF", "12.2XG", "12.2XH", "12.2XI", "12.2XJ", "12.2XK", "12.2XL", "12.2XM", "12.2XQ", "12.2XR", "12.2XT", "12.2XW", "12.2YA", "12.2YB", "12.2YC", "12.2YD", "12.2YF", "12.2YG", "12.2YH", "12.2YJ", "12.2YM", "12.2YN", "12.2YP", "12.2YQ", "12.2YR", "12.2YT", "12.2YU", "12.2YV", "12.2YW", "12.2YY", "12.ZB", "12.2ZC", "12.2ZD", "12.2ZE", "12.2ZF", "12.2ZG", "12.2ZH", "12.2ZJ", "12.2ZL", "12.2ZN", "12.2ZO", "12.2ZP") ) vuln ++; if ( "EWA" >< version && check_release(version:version, patched:make_list("12.2(25)EWA2"), newest:"12.2(25)EWA2") ) vuln ++; if ( check_release(version:version, patched:make_list("12.2(25)EY2"), newest:"12.2(25)EY2") ) vuln ++; if ( "SXD" >< version && check_release(version:version, patched:make_list("12.2(18)SXD5"), newest:"12.2(18)SXD5") ) vuln ++; if ( "SXE" >< version && check_release(version:version, patched:make_list("12.2(18)SXE2"), newest:"12.2(18)SXE2") ) vuln ++; # # 12.3 # if ( deprecated_version(version, "12.3B", "12.3BW", "12.3XA", "12.3XB", "12.3XC", "12.3XD", "12.3XE", "12.3XF", "12.3XG", "12.3XH", "12.3XJ", "12.3XK", "12.3XN", "12.3XQ", "12.3XR", "12.3XS", "12.3XT", "12.3XU", "12.3XW", "12.3XX", "12.3YA", "12.3YB") ) vuln ++; if ( check_release(version:version, patched:make_list("12.3(10)"), newest:"12.3(10)") ) vuln ++; if ( check_release(version:version, patched:make_list("12.3(13)BC"), newest:"12.3(13)BC") ) vuln ++; if ( check_release(version:version, patched:make_list("12.3(7)JA"), newest:"12.3(7)JA") ) vuln ++; if ( check_release(version:version, patched:make_list("12.3(8)T4", "12.3(7)T11"), newest:"12.3(7)T11") ) vuln ++; if ( check_release(version:version, patched:make_list("12.3(7)XI6"), newest:"12.3(7)XI6") ) vuln ++; if ( check_release(version:version, patched:make_list("12.3(11)XL"), newest:"12.3(11)XL") ) vuln ++; if ( check_release(version:version, patched:make_list("12.3(8)XY5"), newest:"12.3(8)XY5") ) vuln ++; if ( check_release(version:version, patched:make_list("12.3(8)YD"), newest:"12.3(8)YD") ) vuln ++; if ( check_release(version:version, patched:make_list("12.3(11)YF"), newest:"12.3(11)YF") ) vuln ++; if ( check_release(version:version, patched:make_list("12.3(8)YG"), newest:"12.3(8)YG")) vuln ++; if ( check_release(version:version, patched:make_list("12.3(8)YH"), newest:"12.3(8)YH")) vuln ++; if ( check_release(version:version, patched:make_list("12.3(8)YI"), newest:"12.3(8)YI")) vuln ++; if ( check_release(version:version, patched:make_list("12.3(11)YJ"), newest:"12.3(11)YJ")) vuln ++; if ( check_release(version:version, patched:make_list("12.3(11)YK"), newest:"12.3(11)YK")) vuln ++; if ( check_release(version:version, patched:make_list("12.3(11)YL"), newest:"12.3(11)YL")) vuln ++; if ( check_release(version:version, patched:make_list("12.3(11)YN"), newest:"12.3(11)YN")) vuln ++; if ( check_release(version:version, patched:make_list("12.3(11)YR"), newest:"12.3(11)YR")) vuln ++; if ( check_release(version:version, patched:make_list("12.3(11)YS"), newest:"12.3(11)YS")) vuln ++; if ( check_release(version:version, patched:make_list("12.3(14)YQ"), newest:"12.3(14)YQ")) vuln ++; # 12.4 if ( check_release(version:version, patched:make_list("12.4(1)"), newest:"12.4(1)") ) vuln ++; if ( vuln == 1 ) security_warning(port:161, proto:"udp"); else if ( vuln > 1 ) display("IOS version ", version, " identified as vulnerable by multiple checks\n");
Oval
accepted | 2008-09-08T04:00:42.538-04:00 | ||||
class | vulnerability | ||||
contributors |
| ||||
description | Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username. | ||||
family | ios | ||||
id | oval:org.mitre.oval:def:5756 | ||||
status | accepted | ||||
submitted | 2008-05-26T11:06:36.000-04:00 | ||||
title | Cisco IOS RADIUS Authentication Bypass Vulnerability | ||||
version | 3 |
References
- http://www.cisco.com/warp/public/707/cisco-sa-20050629-aaa.shtml
- http://www.cisco.com/warp/public/707/cisco-sa-20050629-aaa.shtml
- http://www.securitytracker.com/alerts/2005/Jun/1014330.html
- http://www.securitytracker.com/alerts/2005/Jun/1014330.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21190
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21190
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5756
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5756