[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2012-5424Date: (C)2012-11-09   (M)2023-12-22


Cisco Secure Access Control System (ACS) 5.x before 5.2 Patch 11 and 5.3 before 5.3 Patch 7, when a certain configuration involving TACACS+ and LDAP is used, does not properly validate passwords, which allows remote attackers to bypass authentication by sending a valid username and a crafted password string, aka Bug ID CSCuc65634.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
SECTRACK-1027733
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121107-acs
SECUNIA-51194
BID-56433
OSVDB-87251
cisco-acs-sec-bypass(79860)

CPE    4
cpe:/a:cisco:secure_access_control_server:5.0
cpe:/a:cisco:secure_access_control_server:5.1
cpe:/a:cisco:secure_access_control_server:5.2
cpe:/a:cisco:secure_access_control_server:5.3
...
CWE    1
CWE-20

© SecPod Technologies