Cisco fixes a Critical authentication bypass vulnerability in NFV Infrastructure Software TACACS+ AAA feature

Cisco fixes a Critical authentication bypass vulnerability in NFV Infrastructure Software TACACS+ AAA feature

Cisco has fixed a Critical authentication bypass vulnerability CVE-2021-34746 in NFV Infrastructure Software (NFVIS) TACACS+ authentication, authorization and accounting (AAA) feature.

An attacker could remotely exploit some of these vulnerabilities to take control of an impacted system.

CVE-2021-34746

“This vulnerability is due to incomplete validation of user-supplied input that is passed to an authentication script. An attacker could exploit this vulnerability by injecting parameters into an authentication request. A successful exploit could allow the attacker to bypass authentication and log in as an administrator to the affected device,” Cisco warned in the advisory.

The Critical rated vulnerability CVE-2021-34746 (CVSS score or 9.8) affects Cisco Enterprise NFVIS Release 4.5.1 if the TACACS external authentication method is configured.

Moreover, administrators can run the show running-config tacacs-server command to discover if the TACACS external authentication feature is enabled. If the command results show “No entries found,” then the feature is not enabled.

An update was released on September 1, 2021 to address the issue.

Other vulnerabilities

In addition, Cisco also released Medium severity patches for additional products from September 1 through September 3 this week:

Finally, Cisco also published a High risk advisory for OpenSSL vulnerabilities (CVE-2021-3449 and CVE-2021-3450) on August 31. The latest update added a fix for Webex Room Phone after other Cisco products were patched earlier this year.

OpenSSL had patched the two High severity OpenSSL vulnerabilities back in March in certain OpenSSL versions. As a result, a bad actor could exploit and launch a Denial of Service attack against impacted systems.

On a similar note, QNAP and other network storage makers have issued security advisories for OpenSSL remote code execution and denial-of-service (DoS) vulnerabilities that impact its network-attached storage (NAS) devices.

Readers can also check out Cisco’s security advisories page for more details on most recent Cisco product vulnerabilities and mitigations.

Related Articles