RADIUS: Username Buffer Overflow
This signature detects attempts to exploit a know vulnerability against RADIUS Authentication Bypass protocol. Attackers can craft an overly long username, which can cause the Authentication, Authorization, and Accounting (AAA) process to bypass authentication. This can lead to a buffer overflow and remote execution of arbitrary code.
Extended Description
Cisco IOS Remote Authentication Dial In User Service (RADIUS) is prone to a remote authentication bypass vulnerability. The issue manifests when Cisco IOS is configured to employ AAA RADIUS authentication and is configured to use 'none' as a fallback method. A remote attacker may exploit this issue to bypass authentication and gain unauthorized access to the affected service.
Affected Products
Cisco ios
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Cisco
7.5