Cisco 802.1X (dot1x) Disabled on Network Interface
Detection of manual disablement of IEEE 802.1X (dot1x) on a Cisco network device interface, potentially allowing unauthorized network access and lateral movement.
The disabling of 802.1X authentication on a Cisco network device can bypass Network Access Control (NAC) mechanisms, potentially granting unauthorized devices access to the internal network. Attackers or malicious insiders might disable dot1x to establish persistence or facilitate lateral movement by connecting rogue devices to the network. This can be accomplished through CLI commands such as ‘access-session port-control force-authorized’ or ’no dot1x system-auth-control’, depending on the IOS version. These commands either disable 802.1X on a specific interface or globally across the device. The targeted scope is Cisco network devices utilizing 802.1X for network access control.
Attack Chain
- Attacker gains privileged access to a Cisco network device via compromised credentials or exploiting a vulnerability.
- Attacker executes CLI commands to disable 802.1X authentication on a specific interface or globally.
- Commands used may include ‘access-session port-control force-authorized’, ‘authentication port-control force-authorized’, ‘dot1x port-control force-authorized’, ’no access-session port-control’, ’no authentication port-control’, ’no dot1x port-control’, or ’no dot1x system-auth-control’.
- The network interface transitions to a force-authorized state, bypassing the normal authentication process.
- An unauthorized device is connected to the compromised network interface.
- The unauthorized device gains network access without proper authentication or authorization.
- The attacker leverages the unauthorized access for lateral movement to other systems on the network.
- The attacker exfiltrates sensitive data or deploys malicious payloads across the network.
Impact
Successful disabling of dot1x can lead to unauthorized network access, allowing attackers to bypass security controls. This can result in the compromise of sensitive data, the spread of malware, and the disruption of network services. The number of affected devices and the scope of the compromise depend on the network architecture and the attacker’s objectives. The impact could range from a single compromised workstation to a full-scale network breach affecting thousands of devices and users.
Recommendation
- Deploy the Sigma rule
Cisco Dot1x Disabledto your SIEM to detect the execution of commands that disable 802.1X authentication. - Monitor Cisco AAA logs for events containing keywords such as ‘access-session port-control force-authorized’ and ’no dot1x system-auth-control’ to identify potential attempts to disable dot1x.
- Implement multi-factor authentication (MFA) for all administrative access to Cisco network devices to prevent unauthorized command execution.
- Regularly review and audit the configuration of Cisco network devices to ensure that 802.1X is enabled and properly configured on all relevant interfaces.
Detection coverage 2
Cisco Dot1x Disabled - Specific Interface
mediumDetects the disabling of 802.1X authentication on a specific Cisco network device interface.
Cisco Dot1x Disabled - Global
highDetects the global disabling of 802.1X authentication on a Cisco network device.
Detection queries are kept inside the platform. Get full rules →