The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.
References
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2005-12-22 03:03
Updated : 2018-10-30 09:26
NVD link : CVE-2005-4499
Mitre link : CVE-2005-4499
JSON object : View
CWE
Products Affected
cisco
- vpn_3001_concentrator
- vpn_3002_hardware_client
- vpn_3005_concentrator_software
- pix_firewall_535
- secure_access_control_server
- pix_firewall
- vpn_3080_concentrator
- adaptive_security_appliance_software
- pix_firewall_515e
- pix_firewall_515
- pix_firewall_525
- pix_firewall_520
- vpn_3020_concentrator
- pix_firewall_501
- vpn_3000_concentrator_series_software
- vpn_3030_concentator
- pix_firewall_software
- vpn_3060_concentrator
- pix_asa_ids
- pix_firewall_506
- vpn_3015_concentrator