CVE-2018-0116

Severity
7.2HIGH
EPSS
0.4%
top 42.16%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 8
Latest updateMay 13

Description

A vulnerability in the RADIUS authentication module of Cisco Policy Suite could allow an unauthenticated, remote attacker to be authorized as a subscriber without providing a valid password; however, the attacker must provide a valid username. The vulnerability is due to incorrect RADIUS user credential validation. An attacker could exploit this vulnerability by attempting to access a Cisco Policy Suite domain configured with RADIUS authentication. An exploit could allow the attacker to be autho

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:NExploitability: 3.9 | Impact: 2.7

Affected Packages2 packages

CVEListV5cisco_policy_suiteCisco Policy Suite
NVDcisco/mobility_services_engine13.0.0, 13.1.0, 14.0.0+2

🔴Vulnerability Details

2
GHSA
GHSA-7cfm-96c5-jhrr: A vulnerability in the RADIUS authentication module of Cisco Policy Suite could allow an unauthenticated, remote attacker to be authorized as a subscr2022-05-13
CVEList
CVE-2018-0116: A vulnerability in the RADIUS authentication module of Cisco Policy Suite could allow an unauthenticated, remote attacker to be authorized as a subscr2018-02-08

📋Vendor Advisories

1
Cisco
Cisco Policy Suite RADIUS Authentication Bypass Vulnerability2018-02-07