ID CVE-2005-2105
Summary Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username.
References
Vulnerable Configurations
  • Cisco IOS 12.2(2)XR
    cpe:2.3:o:cisco:ios:12.2%282%29xr
  • Cisco IOS 12.2(4)XR
    cpe:2.3:o:cisco:ios:12.2%284%29xr
  • Cisco IOS 12.2T
    cpe:2.3:o:cisco:ios:12.2t
  • Cisco IOS 12.2XB
    cpe:2.3:o:cisco:ios:12.2xb
  • Cisco IOS 12.2XC
    cpe:2.3:o:cisco:ios:12.2xc
  • Cisco IOS 12.2XD
    cpe:2.3:o:cisco:ios:12.2xd
  • Cisco IOS 12.2XE
    cpe:2.3:o:cisco:ios:12.2xe
  • Cisco IOS 12.2XF
    cpe:2.3:o:cisco:ios:12.2xf
  • Cisco IOS 12.2XG
    cpe:2.3:o:cisco:ios:12.2xg
  • Cisco IOS 12.2XH
    cpe:2.3:o:cisco:ios:12.2xh
  • Cisco IOS 12.2XI
    cpe:2.3:o:cisco:ios:12.2xi
  • Cisco IOS 12.2XJ
    cpe:2.3:o:cisco:ios:12.2xj
  • Cisco IOS 12.2XK
    cpe:2.3:o:cisco:ios:12.2xk
  • Cisco IOS 12.2XL
    cpe:2.3:o:cisco:ios:12.2xl
  • Cisco IOS 12.2XM
    cpe:2.3:o:cisco:ios:12.2xm
  • Cisco IOS 12.2XQ
    cpe:2.3:o:cisco:ios:12.2xq
  • Cisco IOS 12.2XR
    cpe:2.3:o:cisco:ios:12.2xr
  • Cisco IOS 12.2XT
    cpe:2.3:o:cisco:ios:12.2xt
  • Cisco IOS 12.2XW
    cpe:2.3:o:cisco:ios:12.2xw
  • Cisco IOS 12.2YA
    cpe:2.3:o:cisco:ios:12.2ya
  • Cisco IOS 12.2YB
    cpe:2.3:o:cisco:ios:12.2yb
  • Cisco IOS 12.2YC
    cpe:2.3:o:cisco:ios:12.2yc
  • Cisco IOS 12.2YD
    cpe:2.3:o:cisco:ios:12.2yd
  • Cisco IOS 12.2YF
    cpe:2.3:o:cisco:ios:12.2yf
  • Cisco IOS 12.2YG
    cpe:2.3:o:cisco:ios:12.2yg
  • Cisco IOS 12.2YH
    cpe:2.3:o:cisco:ios:12.2yh
  • Cisco IOS 12.2YJ
    cpe:2.3:o:cisco:ios:12.2yj
  • Cisco IOS 12.2YL
    cpe:2.3:o:cisco:ios:12.2yl
  • Cisco IOS 12.2YM
    cpe:2.3:o:cisco:ios:12.2ym
  • Cisco IOS 12.2YN
    cpe:2.3:o:cisco:ios:12.2yn
  • Cisco IOS 12.2YP
    cpe:2.3:o:cisco:ios:12.2yp
  • Cisco IOS 12.2YQ
    cpe:2.3:o:cisco:ios:12.2yq
  • Cisco IOS 12.2YR
    cpe:2.3:o:cisco:ios:12.2yr
  • Cisco IOS 12.2YT
    cpe:2.3:o:cisco:ios:12.2yt
  • Cisco IOS 12.2YU
    cpe:2.3:o:cisco:ios:12.2yu
  • Cisco IOS 12.2YV
    cpe:2.3:o:cisco:ios:12.2yv
  • Cisco IOS 12.2YW
    cpe:2.3:o:cisco:ios:12.2yw
  • Cisco IOS 12.2YY
    cpe:2.3:o:cisco:ios:12.2yy
  • Cisco IOS 12.2ZB
    cpe:2.3:o:cisco:ios:12.2zb
  • Cisco IOS 12.2ZC
    cpe:2.3:o:cisco:ios:12.2zc
  • Cisco IOS 12.2ZD
    cpe:2.3:o:cisco:ios:12.2zd
  • Cisco IOS 12.2ZE
    cpe:2.3:o:cisco:ios:12.2ze
  • Cisco IOS 12.2ZF
    cpe:2.3:o:cisco:ios:12.2zf
  • Cisco IOS 12.2ZG
    cpe:2.3:o:cisco:ios:12.2zg
  • Cisco IOS 12.2ZH
    cpe:2.3:o:cisco:ios:12.2zh
  • Cisco IOS 12.2ZJ
    cpe:2.3:o:cisco:ios:12.2zj
  • Cisco IOS 12.2ZL
    cpe:2.3:o:cisco:ios:12.2zl
  • Cisco IOS 12.2ZN
    cpe:2.3:o:cisco:ios:12.2zn
  • Cisco IOS 12.2ZO
    cpe:2.3:o:cisco:ios:12.2zo
  • Cisco IOS 12.2ZP
    cpe:2.3:o:cisco:ios:12.2zp
  • Cisco IOS 12.3B
    cpe:2.3:o:cisco:ios:12.3b
  • Cisco IOS 12.3BC
    cpe:2.3:o:cisco:ios:12.3bc
  • Cisco IOS 12.3BW
    cpe:2.3:o:cisco:ios:12.3bw
  • Cisco IOS 12.3JA
    cpe:2.3:o:cisco:ios:12.3ja
  • Cisco IOS 12.3T
    cpe:2.3:o:cisco:ios:12.3t
  • Cisco IOS 12.3XA
    cpe:2.3:o:cisco:ios:12.3xa
  • Cisco IOS 12.3XB
    cpe:2.3:o:cisco:ios:12.3xb
  • Cisco IOS 12.3XC
    cpe:2.3:o:cisco:ios:12.3xc
  • Cisco IOS 12.3XD
    cpe:2.3:o:cisco:ios:12.3xd
  • Cisco IOS 12.3XE
    cpe:2.3:o:cisco:ios:12.3xe
  • Cisco IOS 12.3XF
    cpe:2.3:o:cisco:ios:12.3xf
  • Cisco IOS 12.3XG
    cpe:2.3:o:cisco:ios:12.3xg
  • Cisco IOS 12.3XH
    cpe:2.3:o:cisco:ios:12.3xh
  • Cisco IOS 12.3XI
    cpe:2.3:o:cisco:ios:12.3xi
  • Cisco IOS 12.3XJ
    cpe:2.3:o:cisco:ios:12.3xj
  • Cisco IOS 12.3XK
    cpe:2.3:o:cisco:ios:12.3xk
  • Cisco IOS 12.3XL
    cpe:2.3:o:cisco:ios:12.3xl
  • Cisco IOS 12.3XM
    cpe:2.3:o:cisco:ios:12.3xm
  • Cisco IOS 12.3XN
    cpe:2.3:o:cisco:ios:12.3xn
  • Cisco IOS 12.3XQ
    cpe:2.3:o:cisco:ios:12.3xq
  • Cisco IOS 12.3XR
    cpe:2.3:o:cisco:ios:12.3xr
  • Cisco IOS 12.3XS
    cpe:2.3:o:cisco:ios:12.3xs
  • Cisco IOS 12.3XT
    cpe:2.3:o:cisco:ios:12.3xt
  • Cisco IOS 12.3XU
    cpe:2.3:o:cisco:ios:12.3xu
  • Cisco IOS 12.3XW
    cpe:2.3:o:cisco:ios:12.3xw
  • Cisco IOS 12.3XX
    cpe:2.3:o:cisco:ios:12.3xx
  • Cisco IOS 12.3XY
    cpe:2.3:o:cisco:ios:12.3xy
  • Cisco IOS 12.3YA
    cpe:2.3:o:cisco:ios:12.3ya
  • Cisco IOS 12.3YB
    cpe:2.3:o:cisco:ios:12.3yb
  • Cisco IOS 12.3YD
    cpe:2.3:o:cisco:ios:12.3yd
  • Cisco IOS 12.3YF
    cpe:2.3:o:cisco:ios:12.3yf
  • Cisco IOS 12.3YG
    cpe:2.3:o:cisco:ios:12.3yg
  • Cisco IOS 12.3YH
    cpe:2.3:o:cisco:ios:12.3yh
  • Cisco IOS 12.3YI
    cpe:2.3:o:cisco:ios:12.3yi
  • Cisco IOS 12.3YJ
    cpe:2.3:o:cisco:ios:12.3yj
  • Cisco IOS 12.3YK
    cpe:2.3:o:cisco:ios:12.3yk
  • Cisco IOS 12.3YL
    cpe:2.3:o:cisco:ios:12.3yl
  • Cisco IOS 12.3YN
    cpe:2.3:o:cisco:ios:12.3yn
  • Cisco IOS 12.3YQ
    cpe:2.3:o:cisco:ios:12.3yq
  • Cisco IOS 12.3YR
    cpe:2.3:o:cisco:ios:12.3yr
  • Cisco IOS 12.3YS
    cpe:2.3:o:cisco:ios:12.3ys
  • Cisco IOS 12.4
    cpe:2.3:o:cisco:ios:12.4
CVSS
Base: 7.5 (as of 05-07-2005 - 15:30)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
nessus via4
  • NASL family CISCO
    NASL id CSCEE45312.NASL
    description The remote host is a CISCO router containing a version of IOS that contains a faulty RADIUS implementation which may lead to an authentication bypass vulnerability. An attacker may exploit this problem to gain unauthorized access to the service.
    last seen 2019-02-21
    modified 2018-06-27
    plugin id 20933
    published 2006-02-17
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20933
    title Cisco IOS AAA RADIUS Long Username Authentication Bypass (CSCee45312)
  • NASL family CISCO
    NASL id CISCO-SA-20050629-AAA.NASL
    description Remote Authentication Dial In User Service (RADIUS) authentication on a device that is running certain versions of Cisco Internetworking Operating System (IOS) and configured with a fallback method to none can be bypassed. Systems that are configured for other authentication methods or that are not configured with a fallback method to none are not affected. Only the systems that are running certain versions of Cisco IOS are affected. Not all configurations using RADIUS and none are vulnerable to this issue. Some configurations using RADIUS, none and an additional method are not affected. Cisco has made free software available to address this vulnerability. There are workarounds available to mitigate the effects of the vulnerability. The vulnerabilities are documented as the following Cisco Bug ID: CSCee45312 -- Radius authentication bypass when configured with a none fallback method.
    last seen 2019-02-21
    modified 2018-12-05
    plugin id 48986
    published 2010-09-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=48986
    title RADIUS Authentication Bypass (cisco-sa-20050629-aaa)
oval via4
accepted 2008-09-08T04:00:42.538-04:00
class vulnerability
contributors
name Yuzheng Zhou
organization Hewlett-Packard
description Cisco IOS 12.2T through 12.4 allows remote attackers to bypass Authentication, Authorization, and Accounting (AAA) RADIUS authentication, if the fallback method is set to none, via a long username.
family ios
id oval:org.mitre.oval:def:5756
status accepted
submitted 2008-05-26T11:06:36.000-04:00
title Cisco IOS RADIUS Authentication Bypass Vulnerability
version 3
refmap via4
cisco 20050629 RADIUS Authentication Bypass
sectrack 1014330
xf radius-authentication-bypass(21190)
Last major update 04-03-2009 - 00:35
Published 05-07-2005 - 00:00
Last modified 10-10-2017 - 21:30
Back to Top