Cisco Secure Access Control Server (ACS) 5.3

CPE Details

Cisco Secure Access Control Server (ACS) 5.3
5.3
2012-11-08
13h31 +00:00
2012-11-13
22h55 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:cisco:secure_access_control_server:5.3:*:*:*:*:*:*:*

Informations

Vendor

cisco

Product

secure_access_control_server

Version

5.3

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2012-5424 2012-11-07 22h00 +00:00 Cisco Secure Access Control System (ACS) 5.x before 5.2 Patch 11 and 5.3 before 5.3 Patch 7, when a certain configuration involving TACACS+ and LDAP is used, does not properly validate passwords, which allows remote attackers to bypass authentication by sending a valid username and a crafted password string, aka Bug ID CSCuc65634.
5
CVE-2005-4499 2005-12-22 10h00 +00:00 The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.
7.5