Cisco IOS ACL Bypass (Bug ID CSCdi36962)

High Nessus Network Monitor Plugin ID 2198

Synopsis

The remote host may allow unauthorized traffic to pass, despite configured access controls.

Description

The remote system appears to be vulnerable to a flaw in IOS when the keyword 'tacacs-ds' or 'tacacs' is being used in extended ACLs. This bug can, under very specific circumstances and only with certain IP host implementations, allow unauthorized packets to circumvent a filtering router. This vulnerability is documented as Cisco Bug ID CSCdi36962.

Solution

http://www.cisco.com/warp/public/707/1.html

Plugin Details

Severity: High

ID: 2198

Family: SNMP

Published: 2004/09/03

Modified: 2017/01/31

Nessus ID: 10974

Risk Information

Risk Factor: High

CVSSv2

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSSv3

Base Score: 7.3

Temporal Score: 6.4

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS3#E:U/RL:O/RC:C

Reference Information

CVE: CVE-1999-0161

BID: 703