Cisco Has Fixed A Critical Authentication Bypass Bug

September 3, 2021

Cisco has released a public proof-of-concept exploit code to solve a vulnerability in the Enterprise NFV Infrastructure Software.

The vulnerability, tracked as CVE-2021-34746, was found in the TACACS+ authentication, authorization, and accounting of Cisco Enterprise NFV Infrastructure Software, and allows unauthenticated attacks to log into unpatched devices as administrators.

The bug is caused by incomplete validation of user-supplied input passed to an authentication script during the login process.

Cisco notes that there are no workarounds available to remove the vulnerability vector discovered by the security flaw. The vulnerability, however, was fixed in Cisco Enterprise NFVIS 4.6.1 and later versions. Additionally, the company’s Product Security Incident Response Team points out that while the proof-of-concept is available, there is no visible evidence that the vulnerability has been exploited in the wild.

For more information, read the original story in Bleeping Computer.

Top Stories

Related Articles

March 30, 2026 Google has expanded its “Results about you” tool, allowing users to remove highly sensitive personal data, including more...

March 27, 2026 Microsoft is updating GitHub Copilot to train on real-world developer interactions, expanding beyond public code datasets to more...

March 23, 2026 David Shipley, co-host of Cybersecurity today is covering RSAC for Tech Newsday and Cybersecurity Today.  SAN FRANCISCO more...

March 23, 2026 The U.S. Federal Communications Commission has banned the import of all new foreign-made consumer routers following a more...

Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.
Picture of TND News Desk

TND News Desk

Staff writer for Tech Newsday.

Jim Love

Jim is an author and podcast host with over 40 years in technology.

Share:
Facebook
Twitter
LinkedIn