CVE-2006-0764

The Authentication, Authorization, and Accounting (AAA) capability in versions 5.0(1) and 5.0(3) of the software used by multiple Cisco Anomaly Detection and Mitigation products, when running with an incomplete TACACS+ configuration without a "tacacs-server host" command, allows remote attackers to bypass authentication and gain privileges, aka Bug ID CSCsd21455.
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:h:cisco:guard:5.0\(1\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:guard:5.0\(3\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:traffic_anomaly_detector_module:5.0\(1\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:traffic_anomaly_detector_module:5.0\(3\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:anomaly_guard_module:5.0\(1\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:anomaly_guard_module:5.0\(3\):*:*:*:*:*:*:*

Information

Published : 2006-02-17 18:02

Updated : 2017-07-19 18:30


NVD link : CVE-2006-0764

Mitre link : CVE-2006-0764


JSON object : View

Advertisement

dedicated server usa

Products Affected

cisco

  • traffic_anomaly_detector_module
  • guard
  • anomaly_guard_module