A vulnerability in the TACACS+ authentication, authorization and accounting (AAA) feature of Cisco Enterprise NFV Infrastructure Software (NFVIS) could allow an unauthenticated, remote attacker to bypass authentication and log in to an affected device as an administrator. This vulnerability is due to incomplete validation of user-supplied input that is passed to an authentication script. An attacker could exploit this vulnerability by injecting parameters into an authentication request. A successful exploit could allow the attacker to bypass authentication and log in as an administrator to the affected device.
References
Link | Resource |
---|---|
https://github.com/orangecertcc/security-research/security/advisories/GHSA-gqx8-c4xr-c664 | Exploit Third Party Advisory |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nfvis-g2DMVVh | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2021-09-01T00:00:00
Updated: 2022-04-22T18:05:12
Reserved: 2021-06-15T00:00:00
Link: CVE-2021-34746
JSON object: View
NVD Information
Status : Modified
Published: 2021-09-02T03:15:06.687
Modified: 2023-11-07T03:36:17.353
Link: CVE-2021-34746
JSON object: View
Redhat Information
No data.