Vulnerabilities > CVE-2005-2105 - Unspecified vulnerability in Cisco IOS

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
cisco
nessus

Summary

Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username.

Vulnerable Configurations

Part Description Count
OS
Cisco
92

Nessus

  • NASL familyCISCO
    NASL idCISCO-SA-20050629-AAA.NASL
    descriptionRemote Authentication Dial In User Service (RADIUS) authentication on a device that is running certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback method to none can be bypassed. Systems that are configured for other authentication methods or that are not configured with a fallback method to none are not affected. Only the systems that are running certain versions of Cisco IOS are affected. Not all configurations using RADIUS and none are vulnerable to this issue. Some configurations using RADIUS, none and an additional method are not affected. Cisco has made free software available to address this vulnerability. There are workarounds available to mitigate the effects of the vulnerability. The vulnerabilities are documented as the following Cisco Bug ID: CSCee45312 -- Radius authentication bypass when configured with a none fallback method.
    last seen2020-03-17
    modified2010-09-01
    plugin id48986
    published2010-09-01
    reporterThis script is Copyright (C) 2010-2018 and is owned by Tenable, Inc. or an Affiliate thereof..
    sourcehttps://www.tenable.com/plugins/nessus/48986
    titleRADIUS Authentication Bypass (cisco-sa-20050629-aaa)
    code
    #TRUSTED 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
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were
    # extracted from Cisco Security Advisory cisco-sa-20050629-aaa.
    # The text itself is copyright (C) Cisco
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(48986);
      script_version("1.16");
      script_set_attribute(attribute:"plugin_modification_date", value:"2018/12/05");
    
      script_cve_id("CVE-2005-2105");
      script_xref(name:"CISCO-BUG-ID", value:"CSCee45312");
      script_xref(name:"CISCO-SA", value:"cisco-sa-20050629-aaa");
    
      script_name(english:"RADIUS Authentication Bypass (cisco-sa-20050629-aaa)");
      script_summary(english:"Checks the IOS version.");
    
      script_set_attribute(
        attribute:"synopsis",
        value:"The remote device is missing a vendor-supplied security patch."
      );
      script_set_attribute(
        attribute:"description",
        value:
    "Remote Authentication Dial In User Service (RADIUS) authentication on
    a device that is running certain versions of Cisco Internetworking
    Operating System (IOS) and configured with a fallback method to none
    can be bypassed. Systems that are configured for other authentication
    methods or that are not configured with a fallback method to none are
    not affected. Only the systems that are running certain versions of
    Cisco IOS are affected. Not all configurations using RADIUS and none
    are vulnerable to this issue. Some configurations using RADIUS, none
    and an additional method are not affected. Cisco has made free
    software available to address this vulnerability. There are
    workarounds available to mitigate the effects of the vulnerability.
    The vulnerabilities are documented as the following Cisco Bug ID:
    CSCee45312 -- Radius authentication bypass when configured with a none
    fallback method."
      );
      # https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20050629-aaa
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?7970a950"
      );
      script_set_attribute(
        attribute:"solution",
        value:
    "Apply the relevant patch referenced in Cisco Security Advisory
    cisco-sa-20050629-aaa."
      );
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L");
      script_set_attribute(attribute:"cvss_score_source", value:"CVE-2005-2105");
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:cisco:ios");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2005/06/29");
      script_set_attribute(attribute:"patch_publication_date", value:"2013/02/13");
      script_set_attribute(attribute:"plugin_publication_date", value:"2010/09/01");
    
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2010-2018 and is owned by Tenable, Inc. or an Affiliate thereof..");
      script_family(english:"CISCO");
    
      script_dependencies("cisco_ios_version.nasl");
      script_require_keys("Host/Cisco/IOS/Version");
    
      exit(0);
    }
    
    
    
    include("audit.inc");
    include("cisco_func.inc");
    include("cisco_kb_cmd_func.inc");
    
    flag = 0;
    version = get_kb_item_or_exit("Host/Cisco/IOS/Version");
    override = 0;
    
    if ( version == '12.2(1)MB1' ) flag++;
    if ( version == '12.2(1)XD' ) flag++;
    if ( version == '12.2(1)XD1' ) flag++;
    if ( version == '12.2(1)XD2' ) flag++;
    if ( version == '12.2(1)XD3' ) flag++;
    if ( version == '12.2(1)XD4' ) flag++;
    if ( version == '12.2(1)XE' ) flag++;
    if ( version == '12.2(1)XE1' ) flag++;
    if ( version == '12.2(1)XE2' ) flag++;
    if ( version == '12.2(11)BC1' ) flag++;
    if ( version == '12.2(11)BC1a' ) flag++;
    if ( version == '12.2(11)BC1b' ) flag++;
    if ( version == '12.2(11)BC2' ) flag++;
    if ( version == '12.2(11)BC2a' ) flag++;
    if ( version == '12.2(11)BC3' ) flag++;
    if ( version == '12.2(11)BC3a' ) flag++;
    if ( version == '12.2(11)BC3b' ) flag++;
    if ( version == '12.2(11)BC3c' ) flag++;
    if ( version == '12.2(11)BC3d' ) flag++;
    if ( version == '12.2(11)CX' ) flag++;
    if ( version == '12.2(11)CY' ) flag++;
    if ( version == '12.2(11)JA' ) flag++;
    if ( version == '12.2(11)JA1' ) flag++;
    if ( version == '12.2(11)JA2' ) flag++;
    if ( version == '12.2(11)JA3' ) flag++;
    if ( version == '12.2(11)T' ) flag++;
    if ( version == '12.2(11)T1' ) flag++;
    if ( version == '12.2(11)T10' ) flag++;
    if ( version == '12.2(11)T11' ) flag++;
    if ( version == '12.2(11)T2' ) flag++;
    if ( version == '12.2(11)T3' ) flag++;
    if ( version == '12.2(11)T4' ) flag++;
    if ( version == '12.2(11)T5' ) flag++;
    if ( version == '12.2(11)T6' ) flag++;
    if ( version == '12.2(11)T8' ) flag++;
    if ( version == '12.2(11)T9' ) flag++;
    if ( version == '12.2(11)YP3' ) flag++;
    if ( version == '12.2(11)YQ' ) flag++;
    if ( version == '12.2(11)YR' ) flag++;
    if ( version == '12.2(11)YT' ) flag++;
    if ( version == '12.2(11)YT1' ) flag++;
    if ( version == '12.2(11)YT2' ) flag++;
    if ( version == '12.2(11)YU' ) flag++;
    if ( version == '12.2(11)YV' ) flag++;
    if ( version == '12.2(11)YV1' ) flag++;
    if ( version == '12.2(11)ZC' ) flag++;
    if ( version == '12.2(13)JA' ) flag++;
    if ( version == '12.2(13)JA1' ) flag++;
    if ( version == '12.2(13)JA2' ) flag++;
    if ( version == '12.2(13)JA3' ) flag++;
    if ( version == '12.2(13)JA4' ) flag++;
    if ( version == '12.2(13)T' ) flag++;
    if ( version == '12.2(13)T1' ) flag++;
    if ( version == '12.2(13)T10' ) flag++;
    if ( version == '12.2(13)T11' ) flag++;
    if ( version == '12.2(13)T12' ) flag++;
    if ( version == '12.2(13)T13' ) flag++;
    if ( version == '12.2(13)T14' ) flag++;
    if ( version == '12.2(13)T16' ) flag++;
    if ( version == '12.2(13)T1a' ) flag++;
    if ( version == '12.2(13)T2' ) flag++;
    if ( version == '12.2(13)T3' ) flag++;
    if ( version == '12.2(13)T4' ) flag++;
    if ( version == '12.2(13)T5' ) flag++;
    if ( version == '12.2(13)T8' ) flag++;
    if ( version == '12.2(13)T9' ) flag++;
    if ( version == '12.2(13)ZC' ) flag++;
    if ( version == '12.2(13)ZD' ) flag++;
    if ( version == '12.2(13)ZD1' ) flag++;
    if ( version == '12.2(13)ZD2' ) flag++;
    if ( version == '12.2(13)ZD3' ) flag++;
    if ( version == '12.2(13)ZD4' ) flag++;
    if ( version == '12.2(13)ZE' ) flag++;
    if ( version == '12.2(13)ZF' ) flag++;
    if ( version == '12.2(13)ZF1' ) flag++;
    if ( version == '12.2(13)ZF2' ) flag++;
    if ( version == '12.2(13)ZG' ) flag++;
    if ( version == '12.2(13)ZH' ) flag++;
    if ( version == '12.2(13)ZH1' ) flag++;
    if ( version == '12.2(13)ZH2' ) flag++;
    if ( version == '12.2(13)ZH3' ) flag++;
    if ( version == '12.2(13)ZH4' ) flag++;
    if ( version == '12.2(13)ZH5' ) flag++;
    if ( version == '12.2(13)ZH6' ) flag++;
    if ( version == '12.2(13)ZH7' ) flag++;
    if ( version == '12.2(13)ZP' ) flag++;
    if ( version == '12.2(13)ZP1' ) flag++;
    if ( version == '12.2(13)ZP2' ) flag++;
    if ( version == '12.2(13)ZP3' ) flag++;
    if ( version == '12.2(13)ZP4' ) flag++;
    if ( version == '12.2(15)B' ) flag++;
    if ( version == '12.2(15)BC1' ) flag++;
    if ( version == '12.2(15)BC1a' ) flag++;
    if ( version == '12.2(15)BC1b' ) flag++;
    if ( version == '12.2(15)BC1c' ) flag++;
    if ( version == '12.2(15)BC1d' ) flag++;
    if ( version == '12.2(15)BC1e' ) flag++;
    if ( version == '12.2(15)BC1f' ) flag++;
    if ( version == '12.2(15)BC1g' ) flag++;
    if ( version == '12.2(15)BC2' ) flag++;
    if ( version == '12.2(15)BC2a' ) flag++;
    if ( version == '12.2(15)BC2b' ) flag++;
    if ( version == '12.2(15)BC2c' ) flag++;
    if ( version == '12.2(15)BC2d' ) flag++;
    if ( version == '12.2(15)BC2e' ) flag++;
    if ( version == '12.2(15)BC2f' ) flag++;
    if ( version == '12.2(15)BC2g' ) flag++;
    if ( version == '12.2(15)BC2h' ) flag++;
    if ( version == '12.2(15)BC2i' ) flag++;
    if ( version == '12.2(15)BX' ) flag++;
    if ( version == '12.2(15)BZ2' ) flag++;
    if ( version == '12.2(15)CX' ) flag++;
    if ( version == '12.2(15)CX1' ) flag++;
    if ( version == '12.2(15)CZ' ) flag++;
    if ( version == '12.2(15)CZ1' ) flag++;
    if ( version == '12.2(15)CZ2' ) flag++;
    if ( version == '12.2(15)CZ3' ) flag++;
    if ( version == '12.2(15)JA' ) flag++;
    if ( version == '12.2(15)JK' ) flag++;
    if ( version == '12.2(15)JK1' ) flag++;
    if ( version == '12.2(15)JK2' ) flag++;
    if ( version == '12.2(15)JK3' ) flag++;
    if ( version == '12.2(15)JK4' ) flag++;
    if ( version == '12.2(15)MC1' ) flag++;
    if ( version == '12.2(15)MC1a' ) flag++;
    if ( version == '12.2(15)MC1b' ) flag++;
    if ( version == '12.2(15)MC1c' ) flag++;
    if ( version == '12.2(15)MC2' ) flag++;
    if ( version == '12.2(15)MC2a' ) flag++;
    if ( version == '12.2(15)MC2b' ) flag++;
    if ( version == '12.2(15)MC2c' ) flag++;
    if ( version == '12.2(15)MC2e' ) flag++;
    if ( version == '12.2(15)MC2f' ) flag++;
    if ( version == '12.2(15)MC2g' ) flag++;
    if ( version == '12.2(15)T' ) flag++;
    if ( version == '12.2(15)T1' ) flag++;
    if ( version == '12.2(15)T10' ) flag++;
    if ( version == '12.2(15)T11' ) flag++;
    if ( version == '12.2(15)T12' ) flag++;
    if ( version == '12.2(15)T13' ) flag++;
    if ( version == '12.2(15)T14' ) flag++;
    if ( version == '12.2(15)T15' ) flag++;
    if ( version == '12.2(15)T16' ) flag++;
    if ( version == '12.2(15)T2' ) flag++;
    if ( version == '12.2(15)T4' ) flag++;
    if ( version == '12.2(15)T4e' ) flag++;
    if ( version == '12.2(15)T5' ) flag++;
    if ( version == '12.2(15)T7' ) flag++;
    if ( version == '12.2(15)T8' ) flag++;
    if ( version == '12.2(15)T9' ) flag++;
    if ( version == '12.2(15)XR' ) flag++;
    if ( version == '12.2(15)XR1' ) flag++;
    if ( version == '12.2(15)XR2' ) flag++;
    if ( version == '12.2(15)ZJ' ) flag++;
    if ( version == '12.2(15)ZJ1' ) flag++;
    if ( version == '12.2(15)ZJ2' ) flag++;
    if ( version == '12.2(15)ZJ3' ) flag++;
    if ( version == '12.2(15)ZJ5' ) flag++;
    if ( version == '12.2(15)ZL' ) flag++;
    if ( version == '12.2(15)ZL1' ) flag++;
    if ( version == '12.2(16)B' ) flag++;
    if ( version == '12.2(16)B1' ) flag++;
    if ( version == '12.2(16)B2' ) flag++;
    if ( version == '12.2(16)BX' ) flag++;
    if ( version == '12.2(16)BX1' ) flag++;
    if ( version == '12.2(16)BX2' ) flag++;
    if ( version == '12.2(16)BX3' ) flag++;
    if ( version == '12.2(18)SXD' ) flag++;
    if ( version == '12.2(18)SXD1' ) flag++;
    if ( version == '12.2(18)SXD2' ) flag++;
    if ( version == '12.2(18)SXD3' ) flag++;
    if ( version == '12.2(18)SXD4' ) flag++;
    if ( version == '12.2(18)SXE' ) flag++;
    if ( version == '12.2(18)SXE1' ) flag++;
    if ( version == '12.2(2)BX' ) flag++;
    if ( version == '12.2(2)BX1' ) flag++;
    if ( version == '12.2(2)BY' ) flag++;
    if ( version == '12.2(2)BY1' ) flag++;
    if ( version == '12.2(2)BY2' ) flag++;
    if ( version == '12.2(2)BY3' ) flag++;
    if ( version == '12.2(2)XB1' ) flag++;
    if ( version == '12.2(2)XB10' ) flag++;
    if ( version == '12.2(2)XB11' ) flag++;
    if ( version == '12.2(2)XB12' ) flag++;
    if ( version == '12.2(2)XB14' ) flag++;
    if ( version == '12.2(2)XB15' ) flag++;
    if ( version == '12.2(2)XB2' ) flag++;
    if ( version == '12.2(2)XB3' ) flag++;
    if ( version == '12.2(2)XB5' ) flag++;
    if ( version == '12.2(2)XB6' ) flag++;
    if ( version == '12.2(2)XB7' ) flag++;
    if ( version == '12.2(2)XB8' ) flag++;
    if ( version == '12.2(2)XC' ) flag++;
    if ( version == '12.2(2)XC1' ) flag++;
    if ( version == '12.2(2)XC2' ) flag++;
    if ( version == '12.2(2)XG' ) flag++;
    if ( version == '12.2(2)XG1' ) flag++;
    if ( version == '12.2(2)XH' ) flag++;
    if ( version == '12.2(2)XH1' ) flag++;
    if ( version == '12.2(2)XH2' ) flag++;
    if ( version == '12.2(2)XI' ) flag++;
    if ( version == '12.2(2)XI1' ) flag++;
    if ( version == '12.2(2)XI2' ) flag++;
    if ( version == '12.2(2)XJ' ) flag++;
    if ( version == '12.2(2)XK' ) flag++;
    if ( version == '12.2(2)XK1' ) flag++;
    if ( version == '12.2(2)XK2' ) flag++;
    if ( version == '12.2(2)XK3' ) flag++;
    if ( version == '12.2(2)XQ' ) flag++;
    if ( version == '12.2(2)XQ1' ) flag++;
    if ( version == '12.2(2)XT' ) flag++;
    if ( version == '12.2(2)XT2' ) flag++;
    if ( version == '12.2(2)XT3' ) flag++;
    if ( version == '12.2(2)XU' ) flag++;
    if ( version == '12.2(2)YC' ) flag++;
    if ( version == '12.2(2)YC1' ) flag++;
    if ( version == '12.2(2)YC2' ) flag++;
    if ( version == '12.2(2)YC3' ) flag++;
    if ( version == '12.2(2)YC4' ) flag++;
    if ( version == '12.2(25)EW' ) flag++;
    if ( version == '12.2(25)EWA' ) flag++;
    if ( version == '12.2(25)EWA1' ) flag++;
    if ( version == '12.2(25)EY' ) flag++;
    if ( version == '12.2(25)EY1' ) flag++;
    if ( version == '12.2(25)EZ' ) flag++;
    if ( version == '12.2(25)EZ1' ) flag++;
    if ( version == '12.2(25)SE' ) flag++;
    if ( version == '12.2(25)SEA' ) flag++;
    if ( version == '12.2(25)SEB' ) flag++;
    if ( version == '12.2(25)SEB1' ) flag++;
    if ( version == '12.2(30)S' ) flag++;
    if ( version == '12.2(30)S1' ) flag++;
    if ( version == '12.2(4)B' ) flag++;
    if ( version == '12.2(4)B1' ) flag++;
    if ( version == '12.2(4)B2' ) flag++;
    if ( version == '12.2(4)B3' ) flag++;
    if ( version == '12.2(4)B4' ) flag++;
    if ( version == '12.2(4)B5' ) flag++;
    if ( version == '12.2(4)B6' ) flag++;
    if ( version == '12.2(4)B7' ) flag++;
    if ( version == '12.2(4)B8' ) flag++;
    if ( version == '12.2(4)BC1' ) flag++;
    if ( version == '12.2(4)BC1a' ) flag++;
    if ( version == '12.2(4)BC1b' ) flag++;
    if ( version == '12.2(4)BW' ) flag++;
    if ( version == '12.2(4)BW1' ) flag++;
    if ( version == '12.2(4)BW1a' ) flag++;
    if ( version == '12.2(4)BW2' ) flag++;
    if ( version == '12.2(4)BZ1' ) flag++;
    if ( version == '12.2(4)BZ2' ) flag++;
    if ( version == '12.2(4)JA' ) flag++;
    if ( version == '12.2(4)JA1' ) flag++;
    if ( version == '12.2(4)MB1' ) flag++;
    if ( version == '12.2(4)MB10' ) flag++;
    if ( version == '12.2(4)MB11' ) flag++;
    if ( version == '12.2(4)MB12' ) flag++;
    if ( version == '12.2(4)MB13' ) flag++;
    if ( version == '12.2(4)MB13a' ) flag++;
    if ( version == '12.2(4)MB13b' ) flag++;
    if ( version == '12.2(4)MB13c' ) flag++;
    if ( version == '12.2(4)MB2' ) flag++;
    if ( version == '12.2(4)MB3' ) flag++;
    if ( version == '12.2(4)MB4' ) flag++;
    if ( version == '12.2(4)MB5' ) flag++;
    if ( version == '12.2(4)MB6' ) flag++;
    if ( version == '12.2(4)MB7' ) flag++;
    if ( version == '12.2(4)MB8' ) flag++;
    if ( version == '12.2(4)MB9' ) flag++;
    if ( version == '12.2(4)MB9a' ) flag++;
    if ( version == '12.2(4)T' ) flag++;
    if ( version == '12.2(4)T1' ) flag++;
    if ( version == '12.2(4)T2' ) flag++;
    if ( version == '12.2(4)T3' ) flag++;
    if ( version == '12.2(4)T5' ) flag++;
    if ( version == '12.2(4)T6' ) flag++;
    if ( version == '12.2(4)T7' ) flag++;
    if ( version == '12.2(4)XF' ) flag++;
    if ( version == '12.2(4)XF1' ) flag++;
    if ( version == '12.2(4)XL' ) flag++;
    if ( version == '12.2(4)XL1' ) flag++;
    if ( version == '12.2(4)XL2' ) flag++;
    if ( version == '12.2(4)XL3' ) flag++;
    if ( version == '12.2(4)XL4' ) flag++;
    if ( version == '12.2(4)XL5' ) flag++;
    if ( version == '12.2(4)XL6' ) flag++;
    if ( version == '12.2(4)XM' ) flag++;
    if ( version == '12.2(4)XM1' ) flag++;
    if ( version == '12.2(4)XM2' ) flag++;
    if ( version == '12.2(4)XM3' ) flag++;
    if ( version == '12.2(4)XM4' ) flag++;
    if ( version == '12.2(4)XR' ) flag++;
    if ( version == '12.2(4)XV' ) flag++;
    if ( version == '12.2(4)XV1' ) flag++;
    if ( version == '12.2(4)XV2' ) flag++;
    if ( version == '12.2(4)XV3' ) flag++;
    if ( version == '12.2(4)XV4' ) flag++;
    if ( version == '12.2(4)XV4a' ) flag++;
    if ( version == '12.2(4)XV5' ) flag++;
    if ( version == '12.2(4)XW' ) flag++;
    if ( version == '12.2(4)YA' ) flag++;
    if ( version == '12.2(4)YA1' ) flag++;
    if ( version == '12.2(4)YA10' ) flag++;
    if ( version == '12.2(4)YA2' ) flag++;
    if ( version == '12.2(4)YA3' ) flag++;
    if ( version == '12.2(4)YA4' ) flag++;
    if ( version == '12.2(4)YA5' ) flag++;
    if ( version == '12.2(4)YA6' ) flag++;
    if ( version == '12.2(4)YA7' ) flag++;
    if ( version == '12.2(4)YA8' ) flag++;
    if ( version == '12.2(4)YA9' ) flag++;
    if ( version == '12.2(4)YB' ) flag++;
    if ( version == '12.2(4)YF' ) flag++;
    if ( version == '12.2(4)YG' ) flag++;
    if ( version == '12.2(4)YH' ) flag++;
    if ( version == '12.2(8)BC1' ) flag++;
    if ( version == '12.2(8)BC2' ) flag++;
    if ( version == '12.2(8)BC2a' ) flag++;
    if ( version == '12.2(8)BY' ) flag++;
    if ( version == '12.2(8)BY1' ) flag++;
    if ( version == '12.2(8)BY2' ) flag++;
    if ( version == '12.2(8)JA' ) flag++;
    if ( version == '12.2(8)MC1' ) flag++;
    if ( version == '12.2(8)MC2' ) flag++;
    if ( version == '12.2(8)MC2a' ) flag++;
    if ( version == '12.2(8)MC2b' ) flag++;
    if ( version == '12.2(8)MC2c' ) flag++;
    if ( version == '12.2(8)MC2d' ) flag++;
    if ( version == '12.2(8)T' ) flag++;
    if ( version == '12.2(8)T1' ) flag++;
    if ( version == '12.2(8)T10' ) flag++;
    if ( version == '12.2(8)T2' ) flag++;
    if ( version == '12.2(8)T3' ) flag++;
    if ( version == '12.2(8)T4' ) flag++;
    if ( version == '12.2(8)T5' ) flag++;
    if ( version == '12.2(8)T7' ) flag++;
    if ( version == '12.2(8)T8' ) flag++;
    if ( version == '12.2(8)YD' ) flag++;
    if ( version == '12.2(8)YD1' ) flag++;
    if ( version == '12.2(8)YD2' ) flag++;
    if ( version == '12.2(8)YD3' ) flag++;
    if ( version == '12.2(8)YJ' ) flag++;
    if ( version == '12.2(8)YJ1' ) flag++;
    if ( version == '12.2(8)YL' ) flag++;
    if ( version == '12.2(8)YM' ) flag++;
    if ( version == '12.2(8)YN' ) flag++;
    if ( version == '12.2(8)YN1' ) flag++;
    if ( version == '12.2(8)YW' ) flag++;
    if ( version == '12.2(8)YW1' ) flag++;
    if ( version == '12.2(8)YW2' ) flag++;
    if ( version == '12.2(8)YW3' ) flag++;
    if ( version == '12.2(8)YY' ) flag++;
    if ( version == '12.2(8)YY1' ) flag++;
    if ( version == '12.2(8)YY2' ) flag++;
    if ( version == '12.2(8)YY3' ) flag++;
    if ( version == '12.2(8)YY4' ) flag++;
    if ( version == '12.2(8)ZB' ) flag++;
    if ( version == '12.2(8)ZB1' ) flag++;
    if ( version == '12.2(8)ZB2' ) flag++;
    if ( version == '12.2(8)ZB3' ) flag++;
    if ( version == '12.2(8)ZB4' ) flag++;
    if ( version == '12.2(8)ZB4a' ) flag++;
    if ( version == '12.2(8)ZB5' ) flag++;
    if ( version == '12.2(8)ZB6' ) flag++;
    if ( version == '12.2(8)ZB7' ) flag++;
    if ( version == '12.2(8)ZB8' ) flag++;
    if ( version == '12.3(1)' ) flag++;
    if ( version == '12.3(1a)' ) flag++;
    if ( version == '12.3(1a)B' ) flag++;
    if ( version == '12.3(1a)BW' ) flag++;
    if ( version == '12.3(2)JA' ) flag++;
    if ( version == '12.3(2)JA1' ) flag++;
    if ( version == '12.3(2)JA2' ) flag++;
    if ( version == '12.3(2)JA5' ) flag++;
    if ( version == '12.3(2)T' ) flag++;
    if ( version == '12.3(2)T1' ) flag++;
    if ( version == '12.3(2)T2' ) flag++;
    if ( version == '12.3(2)T3' ) flag++;
    if ( version == '12.3(2)T4' ) flag++;
    if ( version == '12.3(2)T5' ) flag++;
    if ( version == '12.3(2)T6' ) flag++;
    if ( version == '12.3(2)T7' ) flag++;
    if ( version == '12.3(2)T8' ) flag++;
    if ( version == '12.3(2)T9' ) flag++;
    if ( version == '12.3(2)XA' ) flag++;
    if ( version == '12.3(2)XA1' ) flag++;
    if ( version == '12.3(2)XA2' ) flag++;
    if ( version == '12.3(2)XA3' ) flag++;
    if ( version == '12.3(2)XA4' ) flag++;
    if ( version == '12.3(2)XB' ) flag++;
    if ( version == '12.3(2)XB1' ) flag++;
    if ( version == '12.3(2)XB3' ) flag++;
    if ( version == '12.3(2)XC' ) flag++;
    if ( version == '12.3(2)XC1' ) flag++;
    if ( version == '12.3(2)XC2' ) flag++;
    if ( version == '12.3(2)XC3' ) flag++;
    if ( version == '12.3(2)XE' ) flag++;
    if ( version == '12.3(2)XE1' ) flag++;
    if ( version == '12.3(2)XE2' ) flag++;
    if ( version == '12.3(2)XE3' ) flag++;
    if ( version == '12.3(2)XF' ) flag++;
    if ( version == '12.3(2)XZ' ) flag++;
    if ( version == '12.3(2)XZ1' ) flag++;
    if ( version == '12.3(2)XZ2' ) flag++;
    if ( version == '12.3(3)' ) flag++;
    if ( version == '12.3(3)B' ) flag++;
    if ( version == '12.3(3)B1' ) flag++;
    if ( version == '12.3(3a)' ) flag++;
    if ( version == '12.3(3b)' ) flag++;
    if ( version == '12.3(3c)' ) flag++;
    if ( version == '12.3(3e)' ) flag++;
    if ( version == '12.3(3f)' ) flag++;
    if ( version == '12.3(3g)' ) flag++;
    if ( version == '12.3(3h)' ) flag++;
    if ( version == '12.3(4)JA' ) flag++;
    if ( version == '12.3(4)JA1' ) flag++;
    if ( version == '12.3(4)T' ) flag++;
    if ( version == '12.3(4)T1' ) flag++;
    if ( version == '12.3(4)T10' ) flag++;
    if ( version == '12.3(4)T11' ) flag++;
    if ( version == '12.3(4)T2' ) flag++;
    if ( version == '12.3(4)T2a' ) flag++;
    if ( version == '12.3(4)T3' ) flag++;
    if ( version == '12.3(4)T4' ) flag++;
    if ( version == '12.3(4)T6' ) flag++;
    if ( version == '12.3(4)T7' ) flag++;
    if ( version == '12.3(4)T8' ) flag++;
    if ( version == '12.3(4)T9' ) flag++;
    if ( version == '12.3(4)XD' ) flag++;
    if ( version == '12.3(4)XD1' ) flag++;
    if ( version == '12.3(4)XD2' ) flag++;
    if ( version == '12.3(4)XD3' ) flag++;
    if ( version == '12.3(4)XD4' ) flag++;
    if ( version == '12.3(4)XG' ) flag++;
    if ( version == '12.3(4)XG1' ) flag++;
    if ( version == '12.3(4)XG2' ) flag++;
    if ( version == '12.3(4)XG3' ) flag++;
    if ( version == '12.3(4)XG4' ) flag++;
    if ( version == '12.3(4)XK' ) flag++;
    if ( version == '12.3(4)XK1' ) flag++;
    if ( version == '12.3(4)XK2' ) flag++;
    if ( version == '12.3(4)XK3' ) flag++;
    if ( version == '12.3(4)XQ' ) flag++;
    if ( version == '12.3(4)XQ1' ) flag++;
    if ( version == '12.3(5)' ) flag++;
    if ( version == '12.3(5a)' ) flag++;
    if ( version == '12.3(5a)B' ) flag++;
    if ( version == '12.3(5a)B1' ) flag++;
    if ( version == '12.3(5a)B2' ) flag++;
    if ( version == '12.3(5a)B3' ) flag++;
    if ( version == '12.3(5a)B4' ) flag++;
    if ( version == '12.3(5a)B5' ) flag++;
    if ( version == '12.3(5b)' ) flag++;
    if ( version == '12.3(5c)' ) flag++;
    if ( version == '12.3(5d)' ) flag++;
    if ( version == '12.3(5e)' ) flag++;
    if ( version == '12.3(6)' ) flag++;
    if ( version == '12.3(6a)' ) flag++;
    if ( version == '12.3(6b)' ) flag++;
    if ( version == '12.3(6c)' ) flag++;
    if ( version == '12.3(6e)' ) flag++;
    if ( version == '12.3(7)T' ) flag++;
    if ( version == '12.3(7)T1' ) flag++;
    if ( version == '12.3(7)T10' ) flag++;
    if ( version == '12.3(7)T2' ) flag++;
    if ( version == '12.3(7)T3' ) flag++;
    if ( version == '12.3(7)T4' ) flag++;
    if ( version == '12.3(7)T6' ) flag++;
    if ( version == '12.3(7)T7' ) flag++;
    if ( version == '12.3(7)T8' ) flag++;
    if ( version == '12.3(7)T9' ) flag++;
    if ( version == '12.3(7)XI1' ) flag++;
    if ( version == '12.3(7)XI1b' ) flag++;
    if ( version == '12.3(7)XI1c' ) flag++;
    if ( version == '12.3(7)XI2' ) flag++;
    if ( version == '12.3(7)XI2a' ) flag++;
    if ( version == '12.3(7)XI3' ) flag++;
    if ( version == '12.3(7)XI4' ) flag++;
    if ( version == '12.3(7)XI5' ) flag++;
    if ( version == '12.3(7)XJ' ) flag++;
    if ( version == '12.3(7)XJ1' ) flag++;
    if ( version == '12.3(7)XJ2' ) flag++;
    if ( version == '12.3(7)XR' ) flag++;
    if ( version == '12.3(7)XR2' ) flag++;
    if ( version == '12.3(7)XR3' ) flag++;
    if ( version == '12.3(7)XR4' ) flag++;
    if ( version == '12.3(7)XS' ) flag++;
    if ( version == '12.3(7)XS1' ) flag++;
    if ( version == '12.3(7)XS2' ) flag++;
    if ( version == '12.3(8)T' ) flag++;
    if ( version == '12.3(8)T1' ) flag++;
    if ( version == '12.3(8)T3' ) flag++;
    if ( version == '12.3(8)XU' ) flag++;
    if ( version == '12.3(8)XU1' ) flag++;
    if ( version == '12.3(8)XU2' ) flag++;
    if ( version == '12.3(8)XU3' ) flag++;
    if ( version == '12.3(8)XU4' ) flag++;
    if ( version == '12.3(8)XU5' ) flag++;
    if ( version == '12.3(8)XW' ) flag++;
    if ( version == '12.3(8)XW1' ) flag++;
    if ( version == '12.3(8)XW2' ) flag++;
    if ( version == '12.3(8)XW3' ) flag++;
    if ( version == '12.3(8)XX' ) flag++;
    if ( version == '12.3(8)XX1' ) flag++;
    if ( version == '12.3(8)XY' ) flag++;
    if ( version == '12.3(8)XY1' ) flag++;
    if ( version == '12.3(8)XY2' ) flag++;
    if ( version == '12.3(8)XY3' ) flag++;
    if ( version == '12.3(8)XY4' ) flag++;
    if ( version == '12.3(8)YA' ) flag++;
    if ( version == '12.3(8)YA1' ) flag++;
    if ( version == '12.3(9)' ) flag++;
    if ( version == '12.3(9a)' ) flag++;
    if ( version == '12.3(9a)BC' ) flag++;
    if ( version == '12.3(9a)BC1' ) flag++;
    if ( version == '12.3(9a)BC2' ) flag++;
    if ( version == '12.3(9a)BC3' ) flag++;
    if ( version == '12.3(9a)BC4' ) flag++;
    if ( version == '12.3(9a)BC5' ) flag++;
    if ( version == '12.3(9a)BC6' ) flag++;
    if ( version == '12.3(9b)' ) flag++;
    if ( version == '12.3(9c)' ) flag++;
    if ( version == '12.3(9d)' ) flag++;
    
    if (get_kb_item("Host/local_checks_enabled"))
    {
      if (flag)
      {
        flag = 0;
        buf = cisco_command_kb_item("Host/Cisco/Config/show_running-config", "show running-config");
        if (check_cisco_result(buf))
        {
          if (preg(pattern:"aaa authentication login [^\r\n]+ group radius none", multiline:TRUE, string:buf)) { flag = 1; }
          if (preg(pattern:"aaa authentication ppp [^\r\n]+ group radius none", multiline:TRUE, string:buf)) { flag = 1; }
          if (preg(pattern:"aaa authentication login [^\r\n]'+ group radius local none", multiline:TRUE, string:buf)) { flag = 1; }
          if (preg(pattern:"aaa authentication ppp [^\r\n]+ group radius local none", multiline:TRUE, string:buf)) { flag = 1; }
        } else if (cisco_needs_enable(buf)) { flag = 1; override = 1; }
      }
    }
    
    
    if (flag)
    {
      security_hole(port:0, extra:cisco_caveat(override));
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
    
  • NASL familyCISCO
    NASL idCSCEE45312.NASL
    descriptionThe remote host is a CISCO router containing a version of IOS that contains a faulty RADIUS implementation which may lead to an authentication bypass vulnerability. An attacker may exploit this problem to gain unauthorized access to the service.
    last seen2020-06-01
    modified2020-06-02
    plugin id20933
    published2006-02-17
    reporterThis script is Copyright (C) 2006-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/20933
    titleCisco IOS AAA RADIUS Long Username Authentication Bypass (CSCee45312)
    code
    #
    # (C) Tenable Network Security, Inc.
    #
    
    
    include("compat.inc");
    
    if(description)
    {
     script_id(20933);
     script_bugtraq_id(14092);
     script_cve_id("CVE-2005-2105");
    
     script_version("1.17");
    
     script_name(english:"Cisco IOS AAA RADIUS Long Username Authentication Bypass (CSCee45312)");
    
     script_set_attribute(attribute:"synopsis", value:
    "The remote Cisco IOS RADIUS server is prone to a remote authentication
    bypass attack." );
     script_set_attribute(attribute:"description", value:
    "The remote host is a CISCO router containing a version of IOS that
    contains a faulty RADIUS implementation which may lead to an 
    authentication bypass vulnerability.
    
    An attacker may exploit this problem to gain unauthorized access
    to the service." );
     script_set_attribute(attribute:"solution", value:
    "http://www.nessus.org/u?b981b4d9" );
     script_set_cvss_base_vector("CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P");
     script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
     script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
     script_set_attribute(attribute:"exploit_available", value:"false");
     script_set_attribute(attribute:"plugin_publication_date", value: "2006/02/17");
     script_set_attribute(attribute:"vuln_publication_date", value: "2005/06/29");
     script_cvs_date("Date: 2018/06/27 18:42:25");
     script_set_attribute(attribute:"plugin_type", value:"local");
     script_set_attribute(attribute:"cpe", value: "cpe:/o:cisco:ios");
     script_end_attributes();
    
     summary["english"] = "Uses SNMP to determine if a flaw is present";
     script_summary(english:summary["english"]);
    
     script_category(ACT_GATHER_INFO);
    
     script_copyright(english:"This script is Copyright (C) 2006-2018 Tenable Network Security, Inc.");
    
     script_family(english:"CISCO");
    
     script_dependencie("snmp_sysDesc.nasl", "snmp_cisco_type.nasl");
     script_require_keys("SNMP/community", "SNMP/sysDesc", "CISCO/model");
     exit(0);
    }
    
    
    include('cisco_func.inc');
    
    os = get_kb_item("SNMP/sysDesc"); if(!os)exit(0);
    hardware = get_kb_item("CISCO/model"); if(!hardware)exit(0);
    version = extract_version(os);
    if ( ! version ) exit(0);
    
    
    
    # 12.2
    
    if ( deprecated_version(version, "12.2B", "12.2BC", "12.2BW", "12.2BX", "12.2BY", "12.2BZ", "12.2CX", "12.2CY", "12.2CZ", "12.2EW", "12.2EZ", "12.2JA", "12.2MB", "12.2MC", "12.2MX", "12.2T", "12.2XB", "12.2XC", "12.2XD", "12.2XE", "12.2XF", "12.2XG", "12.2XH", "12.2XI", "12.2XJ", "12.2XK", "12.2XL", "12.2XM", "12.2XQ", "12.2XR", "12.2XT", "12.2XW", "12.2YA", "12.2YB", "12.2YC", "12.2YD", "12.2YF", "12.2YG", "12.2YH", "12.2YJ", "12.2YM", "12.2YN", "12.2YP", "12.2YQ", "12.2YR", "12.2YT", "12.2YU", "12.2YV", "12.2YW", "12.2YY", "12.ZB", "12.2ZC", "12.2ZD", "12.2ZE", "12.2ZF", "12.2ZG", "12.2ZH", "12.2ZJ", "12.2ZL", "12.2ZN", "12.2ZO", "12.2ZP") ) vuln ++;
    
    if ( "EWA" >< version &&
         check_release(version:version, 
    		   patched:make_list("12.2(25)EWA2"),
    		   newest:"12.2(25)EWA2") ) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.2(25)EY2"),
    		   newest:"12.2(25)EY2") ) vuln ++;
    
    if ( "SXD" >< version &&
         check_release(version:version, 
    		   patched:make_list("12.2(18)SXD5"),
    		   newest:"12.2(18)SXD5") ) vuln ++;
    
    if ( "SXE" >< version &&
         check_release(version:version, 
    		   patched:make_list("12.2(18)SXE2"),
    		   newest:"12.2(18)SXE2") ) vuln ++;
    
    #
    # 12.3
    #
    
    if ( deprecated_version(version, "12.3B", "12.3BW", "12.3XA", "12.3XB", "12.3XC", "12.3XD", "12.3XE", "12.3XF", "12.3XG", "12.3XH", "12.3XJ", "12.3XK", "12.3XN", "12.3XQ", "12.3XR", "12.3XS", "12.3XT", "12.3XU", "12.3XW", "12.3XX", "12.3YA", "12.3YB") ) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(10)"),
    		   newest:"12.3(10)") ) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(13)BC"),
    		   newest:"12.3(13)BC") ) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(7)JA"),
    		   newest:"12.3(7)JA") ) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(8)T4", "12.3(7)T11"),
    		   newest:"12.3(7)T11") ) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(7)XI6"),
    		   newest:"12.3(7)XI6") ) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(11)XL"),
    		   newest:"12.3(11)XL") ) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(8)XY5"),
    		   newest:"12.3(8)XY5") ) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(8)YD"),
    		   newest:"12.3(8)YD") ) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(11)YF"),
    		   newest:"12.3(11)YF") ) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(8)YG"),
    		   newest:"12.3(8)YG")) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(8)YH"),
    		   newest:"12.3(8)YH")) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(8)YI"),
    		   newest:"12.3(8)YI")) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(11)YJ"),
    		   newest:"12.3(11)YJ")) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(11)YK"),
    		   newest:"12.3(11)YK")) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(11)YL"),
    		   newest:"12.3(11)YL")) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(11)YN"),
    		   newest:"12.3(11)YN")) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(11)YR"),
    		   newest:"12.3(11)YR")) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(11)YS"),
    		   newest:"12.3(11)YS")) vuln ++;
    
    if ( check_release(version:version, 
    		   patched:make_list("12.3(14)YQ"),
    		   newest:"12.3(14)YQ")) vuln ++;
    
    # 12.4
    
    if ( check_release(version:version, 
    		   patched:make_list("12.4(1)"),
    		   newest:"12.4(1)") ) vuln ++;
    
    
    if ( vuln == 1 ) security_warning(port:161, proto:"udp");
    else if ( vuln > 1 )  display("IOS version ", version, " identified as vulnerable by multiple checks\n");
    
    
    

Oval

accepted2008-09-08T04:00:42.538-04:00
classvulnerability
contributors
nameYuzheng Zhou
organizationHewlett-Packard
descriptionCisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username.
familyios
idoval:org.mitre.oval:def:5756
statusaccepted
submitted2008-05-26T11:06:36.000-04:00
titleCisco IOS RADIUS Authentication Bypass Vulnerability
version3