Skip to main content
CUI

Vulnerability V-215824

Back

V-215824

CAT II

The Cisco router must be configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable.

Ships Affected
1
Total Findings
1
Open
1
Closed
0

Check Text

Step 1: Review the Cisco router configuration to verify that a local account for last resort has been configured. username xxxxxxxxxxx privilege nn common-criteria-policy PASSWORD_POLICY password xxxxxxxxxx Note: The configured Common Criteria policy must be used when creating or changing the local account password as shown in the example above. Step 2: Verify that local is defined after radius or tacas+ in the authentication order as shown in the example below. aaa authentication login default group tacacs+ local If the Cisco router is not configured with only one local account to be used as the account of last resort in the event the authentication server is unavailable, this is a finding.

Fix Text

Step 1: Configure a local account as shown in the example below. R2(config)#username xxxxxxxxx privilege nn secret xxxxxxx Step 2: Configure the authentication order to use the local account if the authentication server is not reachable as shown in the following example: R2(config)#aaa authentication login default group tacacs+ local

STIG Reference

STIG
Cisco IOS XE Router NDM Security Technical Implementation Guide
Version
3
Release
7
Rule ID
SV-215824r1051115_rule

All Occurrences

This vulnerability appears on 1 ship(s)

Ship Hull # Source File Status Assigned To Scan Date Actions
USNS MONTFORD POINT T-ESD-1 _Reviewed/MONTPOINTGTWYRTR/Checklist/MONTPOINTGTWYRTR_CiscoXERtrNDM_V3R5_20251023-150045.ckl
Unassigned 2026-01-14T12:57:25.013310 View in Context
CUI