Vulnerability CVE-2005-4499


Published: 2005-12-22   Modified: 2012-02-12

Description:
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.

Type:

CWE-Other

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Cisco -> Vpn 3060 concentrator 
Cisco -> Pix asa ids 
Cisco -> Vpn 3080 concentrator 
Cisco -> Pix firewall 
Cisco -> Adaptive security appliance 
Cisco -> Secure access control server 
Cisco -> Vpn 3000 concentrator 
Cisco -> Vpn 3002 hardware client 
Cisco -> Vpn 3005 concentrator 
Cisco -> Pix firewall 501 
Cisco -> Adaptive security appliance software 
Cisco -> Pix firewall 506 
Cisco -> Pix firewall software 
Cisco -> Pix firewall 515 
Cisco -> Vpn 3000 concentrator series software 
Cisco -> Pix firewall 515e 
Cisco -> Vpn 3005 concentrator software 
Cisco -> Pix firewall 520 
Cisco -> Pix firewall 525 
Cisco -> Pix firewall 535 
Cisco -> Vpn 3001 concentrator 
Cisco -> Vpn 3015 concentrator 
Cisco -> Vpn 3020 concentrator 
Cisco -> Vpn 3030 concentator 

 References:
http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_field_notice09186a00805bf1c4.shtml
http://www.securityfocus.com/archive/1/420020/100/0/threaded
http://www.securityfocus.com/archive/1/420103/100/0/threaded
http://www.securityfocus.com/bid/16025

Copyright 2024, cxsecurity.com

 

Back to Top