Detectionmediumexperimental
Cisco Dot1x Disabled
Detects the manual disablement of IEEE 802.1X (dot1x) on a Cisco network device interface. Disabling dot1x bypasses Network Access Control (NAC) mechanisms, potentially allowing unauthorized devices to gain access to the internal network. This activity is a common technique used by attackers or malicious insiders to establish persistence or perform lateral movement via rogue devices.
Convert In Phoenix Studio
Open this Sigma rule in the converter with the YAML preloaded and ready for backend selection.
Launch
Log Source
Ciscoaaa
ProductCisco← raw: cisco
Serviceaaa← raw: aaa
Detection Logic
Detection Logic1 selector
detection:
keywords:
# xxx port-control force-authorized : disables 802.1X authentication and causes the port to change to the authorized state without any authentication exchange required
# no xxx port-control : causes the port to fallback to the default setting which is "force-authorized", thereby disabling 802.1X
- 'access-session port-control force-authorized' # Modern IOS-XE
- 'authentication port-control force-authorized' # Older IOS
- 'dot1x port-control force-authorized' # Legacy
- 'no access-session port-control' # Modern IOS-XE
- 'no authentication port-control' # Older IOS
- 'no dot1x port-control' # Legacy
- 'no dot1x system-auth-control' # disables 802.1X globally
condition: keywordsFalse Positives
Administrator troubleshooting connectivity issues
MITRE ATT&CK
Rule Metadata
Rule ID
ef0ff092-a24a-4fbc-beea-06c08d53e085
Status
experimental
Level
medium
Type
Detection
Created
Tue Apr 28
Author
Path
rules/network/cisco/aaa/cisco_cli_dot1x_disabled.yml
Raw Tags
attack.defense-evasionattack.persistenceattack.credential-accessattack.t1562.001attack.t1556.004