Detectionmediumexperimental

Cisco Dot1x Disabled

Detects the manual disablement of IEEE 802.1X (dot1x) on a Cisco network device interface. Disabling dot1x bypasses Network Access Control (NAC) mechanisms, potentially allowing unauthorized devices to gain access to the internal network. This activity is a common technique used by attackers or malicious insiders to establish persistence or perform lateral movement via rogue devices.

Convert In Phoenix Studio

Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.

Launch
Luc GénauxCreated Tue Apr 28ef0ff092-a24a-4fbc-beea-06c08d53e085network
Log Source
Ciscoaaa
ProductCisco← raw: cisco
Serviceaaa← raw: aaa
Detection Logic
Detection Logic1 selector
detection:
    keywords:
        # xxx port-control force-authorized : disables 802.1X authentication and causes the port to change to the authorized state without any authentication exchange required
        # no xxx port-control : causes the port to fallback to the default setting which is "force-authorized", thereby disabling 802.1X
        - 'access-session port-control force-authorized' # Modern IOS-XE
        - 'authentication port-control force-authorized' # Older IOS
        - 'dot1x port-control force-authorized' # Legacy
        - 'no access-session port-control' # Modern IOS-XE
        - 'no authentication port-control' # Older IOS
        - 'no dot1x port-control' # Legacy
        - 'no dot1x system-auth-control' # disables 802.1X globally
    condition: keywords
False Positives

Administrator troubleshooting connectivity issues

Rule Metadata
Rule ID
ef0ff092-a24a-4fbc-beea-06c08d53e085
Status
experimental
Level
medium
Type
Detection
Created
Tue Apr 28
Path
rules/network/cisco/aaa/cisco_cli_dot1x_disabled.yml
Raw Tags
attack.defense-evasionattack.persistenceattack.credential-accessattack.t1562.001attack.t1556.004
View on GitHub