RADIUS Authentication Vulnerability in Cisco Policy Suite
CVE-2018-0134

5.3MEDIUM

Key Information:

Vendor
Cisco
Vendor
CVE Published:
8 February 2018

Summary

A vulnerability exists within the RADIUS authentication module of the Cisco Policy Suite, allowing an unauthenticated remote attacker to ascertain whether a subscriber username is valid. This issue arises due to the RADIUS server component returning distinct authentication failure messages based on the validity of usernames. Consequently, an attacker could leverage these messages to identify valid usernames, potentially facilitating further attacks against the system. For more in-depth information, refer to Cisco security advisories and relevant vulnerability databases.

Affected Version(s)

Cisco Policy Suite Cisco Policy Suite

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.