Количество 4
Количество 4

CVE-2005-4499
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.
GHSA-8cq5-h2jx-4m9x
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.

BDU:2015-00147
Уязвимость программного обеспечения Cisco PIX, позволяющая злоумышленнику повысить свои привилегии

BDU:2015-00146
Уязвимость программного обеспечения Cisco ASA, позволяющая злоумышленнику повысить свои привилегии
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2005-4499 The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS. | CVSS2: 7.5 | 2% Низкий | больше 19 лет назад |
GHSA-8cq5-h2jx-4m9x The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS. | 2% Низкий | больше 3 лет назад | ||
![]() | BDU:2015-00147 Уязвимость программного обеспечения Cisco PIX, позволяющая злоумышленнику повысить свои привилегии | CVSS2: 7.5 | 2% Низкий | больше 10 лет назад |
![]() | BDU:2015-00146 Уязвимость программного обеспечения Cisco ASA, позволяющая злоумышленнику повысить свои привилегии | CVSS2: 7.5 | 2% Низкий | больше 19 лет назад |
Уязвимостей на страницу