Cisco

Secure Access Control Server

29 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 1.83%
  • Published 31.12.2006 05:00:00
  • Last modified 09.04.2025 00:30:58

Multiple unspecified vulnerabilities in the CSRadius service in Cisco Secure Access Control Server (ACS) for Windows before 4.1 and ACS Solution Engine before 4.1 allow remote attackers to cause a denial of service (crash) via a crafted RADIUS Access...

  • EPSS 1.41%
  • Published 26.06.2006 16:05:00
  • Last modified 03.04.2025 01:03:51

Cisco Secure Access Control Server (ACS) 4.x for Windows uses the client's IP address and the server's port number to grant access to an HTTP server port for an administration session, which allows remote attackers to bypass authentication via variou...

Exploit
  • EPSS 25.63%
  • Published 21.06.2006 01:02:00
  • Last modified 03.04.2025 01:03:51

Cross-site scripting (XSS) vulnerability in LogonProxy.cgi in Cisco Secure ACS for UNIX 2.3 allows remote attackers to inject arbitrary web script or HTML via the (1) error, (2) SSL, and (3) Ok parameters.

  • EPSS 0.05%
  • Published 10.05.2006 02:14:00
  • Last modified 03.04.2025 01:03:51

Cisco Secure Access Control Server (ACS) 3.x for Windows stores ACS administrator passwords and the master key in the registry with insecure permissions, which allows local users and remote administrators to decrypt the passwords by using Microsoft's...

  • EPSS 1.91%
  • Published 22.12.2005 11:03:00
  • Last modified 03.04.2025 01:03:51

The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, w...

Exploit
  • EPSS 80.86%
  • Published 31.05.2005 04:00:00
  • Last modified 03.04.2025 01:03:51

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes ...

  • EPSS 10.73%
  • Published 10.01.2005 05:00:00
  • Last modified 03.04.2025 01:03:51

Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which a...

  • EPSS 0.62%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Cisco Secure Access Control Server (ACS) 3.2(3) and earlier spawns a separate unauthenticated TCP connection on a random port when a user authenticates to the ACS GUI, which allows remote attackers to bypass authentication by connecting to that port ...

  • EPSS 0.72%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

Cisco Secure Access Control Server (ACS) 3.2(3) and earlier, when configured with an anonymous bind in Novell Directory Services (NDS) and authenticating NDS users with NDS, allows remote attackers to gain unauthorized access to AAA clients via a bla...

  • EPSS 1.12%
  • Published 31.12.2004 05:00:00
  • Last modified 03.04.2025 01:03:51

The CSAdmin web administration interface for Cisco Secure Access Control Server (ACS) 3.2(2) build 15 allows remote attackers to cause a denial of service (hang) via a flood of TCP connections to port 2002.