Cisco Has Fixed A Critical Authentication Bypass Bug

Share post:

Cisco has released a public proof-of-concept exploit code to solve a vulnerability in the Enterprise NFV Infrastructure Software.

The vulnerability, tracked as CVE-2021-34746, was found in the TACACS+ authentication, authorization, and accounting of Cisco Enterprise NFV Infrastructure Software, and allows unauthenticated attacks to log into unpatched devices as administrators.

The bug is caused by incomplete validation of user-supplied input passed to an authentication script during the login process.

Cisco notes that there are no workarounds available to remove the vulnerability vector discovered by the security flaw. The vulnerability, however, was fixed in Cisco Enterprise NFVIS 4.6.1 and later versions. Additionally, the company’s Product Security Incident Response Team points out that while the proof-of-concept is available, there is no visible evidence that the vulnerability has been exploited in the wild.

For more information, read the original story in Bleeping Computer.

Featured Tech Jobs



Related articles

Kaspersky uncovers malware targeting iPhones running iOS 15.7 and below

Kaspersky has uncovered a sophisticated malware campaign specifically designed to infect iPhones running up to iOS 15.7 through...

WordPress fixes critical Jetpack plugin vulnerability

WordPress has addressed a critical flaw discovered in the Jetpack plugin, which had the potential to enable authors...

Akamai discovers Dark Frost botnet exploiting gaming platforms

Akamai's security intelligence response team recently has alerted the general public of Dark Frost, a botnet that has...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways