// For flags

CVE-2018-0116

 

Severity Score

7.2
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the RADIUS authentication module of Cisco Policy Suite could allow an unauthenticated, remote attacker to be authorized as a subscriber without providing a valid password; however, the attacker must provide a valid username. The vulnerability is due to incorrect RADIUS user credential validation. An attacker could exploit this vulnerability by attempting to access a Cisco Policy Suite domain configured with RADIUS authentication. An exploit could allow the attacker to be authorized as a subscriber without providing a valid password. This vulnerability affects the Cisco Policy Suite application running a release prior to 13.1.0 with Hotfix Patch 1 when RADIUS authentication is configured for a domain. Cisco Policy Suite Release 14.0.0 is also affected, as it includes vulnerable code, but RADIUS authentication is not officially supported in Cisco Policy Suite Releases 14.0.0 and later. Cisco Bug IDs: CSCvg40124.

Una vulnerabilidad en el módulo de autenticación RADIUS de Cisco Policy Suite podría permitir que un atacante remoto no autenticado fuese autorizado como suscriptor sin proporcionar una contraseña válida; sin embargo, el atacante debe proporcionar un nombre de usuario válido. La vulnerabilidad se debe a la validación incorrecta de credenciales de usuario RADIUS. Un atacante podría explotar esta vulnerabilidad intentando acceder a un dominio de Cisco Policy Suite configurado con autenticación RADIUS. Un exploit podría permitir que el atacante fuese autorizado como suscriptor sin proporcionar una contraseña válida. Esta vulnerabilidad afecta a la aplicación Cisco Policy Suite que ejecute una versión anterior a la 13.1.0 con Hotfix Patch 1 cuando la autenticación RADIUS está configurada para un dominio. Cisco Policy Suite Release 14.0.0 también se ha visto afectado, ya que incluye código vulnerable. Sin embargo, la autenticación RADIUS no es compatible oficialmente con Cisco Policy Suite en versiones 14.0.0 y posteriores. Cisco Bug IDs: CSCvg40124.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-11-27 CVE Reserved
  • 2018-02-08 CVE Published
  • 2023-12-19 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-287: Improper Authentication
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Mobility Services Engine
Search vendor "Cisco" for product "Mobility Services Engine"
13.0.0
Search vendor "Cisco" for product "Mobility Services Engine" and version "13.0.0"
-
Affected
Cisco
Search vendor "Cisco"
Mobility Services Engine
Search vendor "Cisco" for product "Mobility Services Engine"
13.1.0
Search vendor "Cisco" for product "Mobility Services Engine" and version "13.1.0"
-
Affected
Cisco
Search vendor "Cisco"
Mobility Services Engine
Search vendor "Cisco" for product "Mobility Services Engine"
14.0.0
Search vendor "Cisco" for product "Mobility Services Engine" and version "14.0.0"
-
Affected