Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/11577 | Patch Vendor Advisory |
http://www.ciac.org/ciac/bulletins/p-028.shtml | Patch Vendor Advisory |
http://www.cisco.com/warp/public/707/cisco-sa-20041102-acs-eap-tls.shtml | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/17936 |
Configurations
Configuration 1 (hide)
|
Information
Published : 2005-01-09 21:00
Updated : 2018-10-30 09:25
NVD link : CVE-2004-1099
Mitre link : CVE-2004-1099
JSON object : View
CWE
Products Affected
cisco
- secure_acs_solution_engine
- secure_access_control_server