Cisco IOS TCLSH AAA Command Authorization Bypass (CSCeh73049)

medium Nessus Plugin ID 20808

Synopsis

The remote router contains a flaw that could allow users with shell access to elevate their privileges.

Description

The remote host is a CISCO router containing a version of IOS that is vulnerable to a remote AAA command authorization bypass attack.

The remote version of IOS does not enforce AAA command authorization checks for commands etnered in the TCL shell. An attacker with a shell access on the remote route could gain elevated privileges on the remote device.

Solution

http://www.nessus.org/u?9ab2b986

Plugin Details

Severity: Medium

ID: 20808

File Name: CSCeh73049.nasl

Version: 1.23

Type: local

Family: CISCO

Published: 1/25/2006

Updated: 6/27/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.4

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: SNMP/sysDesc, SNMP/community, CISCO/model

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 1/25/2006

Reference Information

CVE: CVE-2006-0485, CVE-2006-0486

BID: 16383