Cisco Has Fixed A Critical Authentication Bypass Bug

Share post:

Cisco has released a public proof-of-concept exploit code to solve a vulnerability in the Enterprise NFV Infrastructure Software.

The vulnerability, tracked as CVE-2021-34746, was found in the TACACS+ authentication, authorization, and accounting of Cisco Enterprise NFV Infrastructure Software, and allows unauthenticated attacks to log into unpatched devices as administrators.

The bug is caused by incomplete validation of user-supplied input passed to an authentication script during the login process.

Cisco notes that there are no workarounds available to remove the vulnerability vector discovered by the security flaw. The vulnerability, however, was fixed in Cisco Enterprise NFVIS 4.6.1 and later versions. Additionally, the company’s Product Security Incident Response Team points out that while the proof-of-concept is available, there is no visible evidence that the vulnerability has been exploited in the wild.

For more information, read the original story in Bleeping Computer.

SUBSCRIBE NOW

Related articles

AT&T Fined $13 Million for Supply Chain Data Breach

AT&T has agreed to pay a $13 million fine following a significant data breach that exposed information of...

Supply Chain Attack Weaponizes Communication Devices in Lebanon

A sophisticated supply chain attack has turned everyday communication devices into weapons in Lebanon, marking a new era...

Chinese Botnet “Raptor Train” Infects 260,000 Devices Worldwide

A massive Chinese botnet dubbed "Raptor Train" has been disrupted by the FBI and cybersecurity researchers. This sophisticated...

Multi-year spear-phishing campaign finally caught

U.S. federal prosecutors have indicted Wu Song, a Chinese national employed by state-owned Aviation Industry Corporation of China,...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways