Vulnerability CVE-2004-1099


Published: 2005-01-10   Modified: 2012-02-12

Description:
Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username.

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
10/10
10/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Cisco -> Secure access control server 
Cisco -> Secure access control server solution engine 
Cisco -> Secure acs solution engine 

 References:
http://www.ciac.org/ciac/bulletins/p-028.shtml
http://www.cisco.com/warp/public/707/cisco-sa-20041102-acs-eap-tls.shtml
http://www.securityfocus.com/bid/11577
https://exchange.xforce.ibmcloud.com/vulnerabilities/17936

Copyright 2024, cxsecurity.com

 

Back to Top