CVE-2019-1758 - Improper Authentication

Severity

32%

Complexity

65%

Confidentiality

48%

A vulnerability in 802.1x function of Cisco IOS Software on the Catalyst 6500 Series Switches could allow an unauthenticated, adjacent attacker to access the network prior to authentication. The vulnerability is due to how the 802.1x packets are handled in the process path. An attacker could exploit this vulnerability by attempting to connect to the network on an 802.1x configured port. A successful exploit could allow the attacker to intermittently obtain access to the network.

A vulnerability in 802.1x function of Cisco IOS Software on the Catalyst 6500 Series Switches could allow an unauthenticated, adjacent attacker to access the network prior to authentication. The vulnerability is due to how the 802.1x packets are handled in the process path. An attacker could exploit this vulnerability by attempting to connect to the network on an 802.1x configured port. A successful exploit could allow the attacker to intermittently obtain access to the network.

CVSS 3.0 Base Score 4.3. CVSS Attack Vector: adjacent_network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).

CVSS 2.0 Base Score 3.3. CVSS Attack Vector: adjacent_network. CVSS Attack Complexity: low. CVSS Vector: (AV:A/AC:L/Au:N/C:N/I:P/A:N).

Demo Examples

Improper Authentication

CWE-287

The following code intends to ensure that the user is already logged in. If not, the code performs authentication with the user-provided username and password. If successful, it sets the loggedin and user cookies to "remember" that the user has already logged in. Finally, the code performs administrator tasks if the logged-in user has the "Administrator" username, as recorded in the user cookie.


               
}
}
ExitError("Error: you need to log in first");
);
);
DoAdministratorTasks();

Unfortunately, this code can be bypassed. The attacker can set the cookies independently so that the code does not check the username and password. The attacker could do this with an HTTP request containing headers such as:


               
[body of request]

By setting the loggedin cookie to "true", the attacker bypasses the entire authentication check. By using the "Administrator" value in the user cookie, the attacker also gains privileges to administer the software.

Improper Authentication

CWE-287

Overview

Type

Cisco IOS

First reported 5 years ago

2019-03-28 01:29:00

Last updated 5 years ago

2019-10-09 23:47:00

Affected Software

Cisco IOS 12.2(33)SXJ6

12.2\(33\)sxj6

Cisco IOS 12.2(33)SXJ7

12.2\(33\)sxj7

Cisco IOS 12.2(33)SXJ8

12.2\(33\)sxj8

Cisco IOS 12.2(33)SXJ9

12.2\(33\)sxj9

Cisco IOS 12.2(33)SXJ10

12.2\(33\)sxj10

Cisco IOS 15.1(1)SY1

15.1\(1\)sy1

Cisco IOS 15.1(1)SY2

15.1\(1\)sy2

Cisco IOS 15.1(1)SY3

15.1\(1\)sy3

Cisco IOS 15.1(1)SY4

15.1\(1\)sy4

Cisco IOS 15.1(1)SY5

15.1\(1\)sy5

Cisco IOS 15.1(1)SY6

15.1\(1\)sy6

Cisco IOS 15.1(2)SY

15.1\(2\)sy

Cisco IOS 15.1(2)SY1

15.1\(2\)sy1

Cisco IOS 15.1(2)SY2

15.1\(2\)sy2

Cisco IOS 151.1(2)SY3

15.1\(2\)sy3

Cisco IOS 15.1(2)SY4

15.1\(2\)sy4

Cisco IOS 15.1(2)SY4A

15.1\(2\)sy4a

Cisco IOS 15.1(2)SY5

15.1\(2\)sy5

Cisco IOS 15.1(2)SY6

15.1\(2\)sy6

Cisco IOS 15.1(2)SY7

15.1\(2\)sy7

Cisco IOS 15.1(2)SY8

15.1\(2\)sy8

Cisco IOS 15.1(2)SY10

15.1\(2\)sy10

Cisco IOS 15.2(1)SY

15.2\(1\)sy

Cisco IOS 15.2(1)SY0A

15.2\(1\)sy0a

Cisco IOS 15.2(1)SY1

15.2\(1\)sy1

Cisco IOS 15.2(1)SY1A

15.2\(1\)sy1a

Cisco IOS 15.2(1)SY2

15.2\(1\)sy2

Cisco IOS 15.2(1)SY3

15.2\(1\)sy3

Cisco IOS 15.2(1)SY4

15.2\(1\)sy4

Cisco IOS 15.2(2)SY

15.2\(2\)sy

Cisco IOS 15.2(2)SY1

15.2\(2\)sy1

Cisco IOS 15.2(2)SY2

15.2\(2\)sy2

Cisco IOS 15.2(2)SY3

15.2\(2\)sy3

Cisco IOS 15.2(4)JN1

15.2\(4\)jn1

Cisco IOS 15.3(1)SY

15.3\(1\)sy

Cisco IOS 15.3(1)SY1

15.3\(1\)sy1

Cisco IOS 15.3(1)SY2

15.3\(1\)sy2

Cisco IOS 15.3(3)JA1N

15.3\(3\)ja1n

Cisco IOS 15.4(1)SY

15.4\(1\)sy

Cisco IOS 15.4(1)SY1

15.4\(1\)sy1

Cisco IOS 15.4(1)SY2

15.4\(1\)sy2

Cisco IOS 15.5(1)SY

15.5\(1\)sy

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.