Cisco Secure Access Control Server (ACS) 3.2(3) and earlier, when configured with an anonymous bind in Novell Directory Services (NDS) and authenticating NDS users with NDS, allows remote attackers to gain unauthorized access to AAA clients via a blank password.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:50
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/11047 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/17117 - |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:50
NVD link : CVE-2004-1460
Mitre link : CVE-2004-1460
CVE.ORG link : CVE-2004-1460
JSON object : View
Products Affected
cisco
- secure_acs_solution_engine
- secure_access_control_server
CWE