Описание
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2005-4499
- http://secunia.com/advisories/18141
- http://www.cisco.com/en/US/products/sw/secursw/ps2086/products_field_notice09186a00805bf1c4.shtml
- http://www.osvdb.org/22193
- http://www.securityfocus.com/archive/1/420020/100/0/threaded
- http://www.securityfocus.com/archive/1/420103/100/0/threaded
- http://www.securityfocus.com/bid/16025
EPSS
CVE ID
Связанные уязвимости
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.
Уязвимость программного обеспечения Cisco PIX, позволяющая злоумышленнику повысить свои привилегии
Уязвимость программного обеспечения Cisco ASA, позволяющая злоумышленнику повысить свои привилегии
EPSS