Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco Secure Access Control Server Access-Request Handling Denial of Service Vulnerability

Cisco-SA-20070105-CVE-2006-4097 · Medium · Published · Updated

Cisco Secure Access Control Server for Windows and Cisco Secure Access Control Server Solution Engine contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability exists due to insufficient handling of malformed RADIUS Access-Request messages.  An unauthenticated, remote attacker could exploit this vulnerability by sending a crafted RADIUS Access-Request network packet to an affected system, crashing the CSRadius process.  This renders the system unresponsive to further RADIUS Authentication, Authorization, and Accounting requests. Cisco has confirmed this vulnerability in a security advisory and released updated software to correct it. To exploit this vulnerability, an attacker requires no special authentication credentials and requires no access to shared RADIUS keys.  To accomplish an exploit, an attacker needs to send a crafted network request to an affected system.  This likely requires the attacker to have access to trusted, internal networks or to be within range of wireless access.  In the event of an exploit, attackers can render RADIUS systems unresponsive, denying authentication services to authorized users.  TACACS+ functionality will still be operational, however. Functional exploit code that proves the exploitability of this vulnerability is reported by the vendor but is not available publicly.  However, because the viability of exploitation has been proven, attackers may be more likely to develop exploit code.

Cisco advisory · CSAF JSON

Workarounds

Administrators are advised to apply the appropriate software updates.

Administrators are advised to secure physical access to wired and wireless networks served by affected systems.

Administrators are advised to monitor systems for signs of exploitation.

Administrators are advised to configure affected services to restart in the case of a service failure.

CVEsCVE-2006-4097
Cisco Bug IDsNA
CVSS ScoreBase 3.3
Product Names From Source
Cisco Secure Access Control Server (ACS) for Windows, Cisco Secure Access Control Server Solution Engine (ACSE)

Related Products

Product CVE Evidence
Cisco Secure Access Control Server Solution Engine (ACSE) CVE-2006-4097 Cisco OpenVuln
Cisco Secure Access Control Server (ACS) for Windows CVE-2006-4097 Cisco OpenVuln