Cisco Context Directory Agent Replayed RADIUS Accounting Message Vulnerability

Cisco-SA-20140109-CVE-2014-0654 · Medium · Published · Updated

Data: Cisco advisories · Cisco CSAF · NVD CVEs · NVD CPEs · CISA KEV · EPSS

A vulnerability in RADIUS message processing of Cisco Context Directory Agent (CDA) could allow an unauthenticated, remote attacker to affect the contents of the CDA cache. The vulnerability is due to insufficient validation of RADIUS accounting messages. An attacker could exploit this vulnerability by replaying crafted RADIUS accounting messages. An exploit could allow the attacker to affect the contents of the CDA cache. Cisco has confirmed the vulnerability in a security notice; however, software updates are not available. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to contact the vendor regarding future updates and releases.

Administrators are advised to allow only trusted users to have network access.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2014-0654
Cisco Bug IDsCSCuj45383
CVSS ScoreBase 4.3
Base 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N/E:F/RL:U/RC:C

Products with public affected evidence