Количество 4
Количество 4
CVE-2005-4499
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.
GHSA-8cq5-h2jx-4m9x
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.
BDU:2015-00147
Уязвимость программного обеспечения Cisco PIX, позволяющая злоумышленнику повысить свои привилегии
BDU:2015-00146
Уязвимость программного обеспечения Cisco ASA, позволяющая злоумышленнику повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2005-4499 The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS. | CVSS2: 7.5 | 2% Низкий | около 20 лет назад | |
GHSA-8cq5-h2jx-4m9x The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS. | 2% Низкий | почти 4 года назад | ||
BDU:2015-00147 Уязвимость программного обеспечения Cisco PIX, позволяющая злоумышленнику повысить свои привилегии | CVSS2: 7.5 | 2% Низкий | около 11 лет назад | |
BDU:2015-00146 Уязвимость программного обеспечения Cisco ASA, позволяющая злоумышленнику повысить свои привилегии | CVSS2: 7.5 | 2% Низкий | около 20 лет назад |
Уязвимостей на страницу