A vulnerability in the RADIUS authentication module of Cisco Policy Suite could allow an unauthenticated, remote attacker to be authorized as a subscriber without providing a valid password; however, the attacker must provide a valid username.
The vulnerability is due to incorrect RADIUS user credential validation.
An attacker could exploit this vulnerability by attempting to access a Cisco Policy Suite domain configured with RADIUS authentication.
An exploit could allow the attacker to be authorized as a subscriber without providing a valid password.
Cisco has released software updates that address this vulnerability.
There are no workarounds that address this vulnerability.
This advisory is available at the following link:
Security Impact Rating: High