Datamation content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.
The 802.1x port-based security standard is often considered the
best method of security for network access control (NAC) implementations. But that’s not to say that all 802.1x implementations are always secure and bug-free.
Cisco this week reported that a pair of its 802.1x supplicants (an 802.1x component used in the client endpoints) had flaws that, if exploited, could have allowed an attacker to gain user privileges, modify files or otherwise damage the availability or confidentially of the system.
The Cisco Secure Services Client (CSSC) and a lightweight version of CSSC
included in the Cisco Trust Agent (CTA) within the Cisco Network Admission
Control (NAC) Framework had privilege escalation and password disclosure
vulnerabilities that Cisco has now corrected.
Cisco has fixed four different privilege escalation bugs. According
to Cisco’s advisory, one of the bugs could potentially have allowed an
unprivileged user who is logged into the computer to increase their
privileges to the local system user via the help facility within the
supplicant Graphical User Interface (GUI).
Another bug could have enabled a logged-in, unprivileged
user to launch any program with full system privileges.
Cisco also fixed an unintentional password disclosure bug. The advisory notes that with certain authentication methods, a user password is
logged in cleartext (i.e. non-obfuscated or encrypted) in the respective
application’s log files.
Cisco is not the only vendor that uses 802.1x as a method for deploying
NAC. StillSecure and others, such as Cisco, in the NAC space, also provide alternatives to 802.1x, including DHCP and inline approaches.
This article was first published on InternetNews.com. To read the full article, click here.
RELATED NEWS AND ANALYSIS
-
Ethics and Artificial Intelligence: Driving Greater Equality
FEATURE | By James Maguire,
December 16, 2020
-
AI vs. Machine Learning vs. Deep Learning
FEATURE | By Cynthia Harvey,
December 11, 2020
-
Huawei’s AI Update: Things Are Moving Faster Than We Think
FEATURE | By Rob Enderle,
December 04, 2020
-
Keeping Machine Learning Algorithms Honest in the ‘Ethics-First’ Era
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 18, 2020
-
Key Trends in Chatbots and RPA
FEATURE | By Guest Author,
November 10, 2020
-
Top 10 AIOps Companies
FEATURE | By Samuel Greengard,
November 05, 2020
-
What is Text Analysis?
ARTIFICIAL INTELLIGENCE | By Guest Author,
November 02, 2020
-
How Intel’s Work With Autonomous Cars Could Redefine General Purpose AI
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 29, 2020
-
Dell Technologies World: Weaving Together Human And Machine Interaction For AI And Robotics
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
October 23, 2020
-
The Super Moderator, or How IBM Project Debater Could Save Social Media
FEATURE | By Rob Enderle,
October 16, 2020
-
Top 10 Chatbot Platforms
FEATURE | By Cynthia Harvey,
October 07, 2020
-
Finding a Career Path in AI
ARTIFICIAL INTELLIGENCE | By Guest Author,
October 05, 2020
-
CIOs Discuss the Promise of AI and Data Science
FEATURE | By Guest Author,
September 25, 2020
-
Microsoft Is Building An AI Product That Could Predict The Future
FEATURE | By Rob Enderle,
September 25, 2020
-
Top 10 Machine Learning Companies 2021
FEATURE | By Cynthia Harvey,
September 22, 2020
-
NVIDIA and ARM: Massively Changing The AI Landscape
ARTIFICIAL INTELLIGENCE | By Rob Enderle,
September 18, 2020
-
Continuous Intelligence: Expert Discussion [Video and Podcast]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 14, 2020
-
Artificial Intelligence: Governance and Ethics [Video]
ARTIFICIAL INTELLIGENCE | By James Maguire,
September 13, 2020
-
IBM Watson At The US Open: Showcasing The Power Of A Mature Enterprise-Class AI
FEATURE | By Rob Enderle,
September 11, 2020
-
Artificial Intelligence: Perception vs. Reality
FEATURE | By James Maguire,
September 09, 2020