ID CVE-2004-1099
Summary Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username.
References
Vulnerable Configurations
  • cpe:2.3:a:cisco:secure_access_control_server:3.3\(1\):*:*:*:*:*:*:*
    cpe:2.3:a:cisco:secure_access_control_server:3.3\(1\):*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:secure_access_control_server:3.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:secure_access_control_server:3.3.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:secure_acs_solution_engine:*:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:secure_acs_solution_engine:*:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 30-10-2018 - 16:25)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 11577
ciac P-028
cisco 20041102 Vulnerability in Cisco Secure Access Control Server EAP-TLS Authentication
xf ciscosecure-eaptls-auth-bypass(17936)
Last major update 30-10-2018 - 16:25
Published 10-01-2005 - 05:00
Last modified 30-10-2018 - 16:25
Back to Top