Cisco Clean Access (CCA) 3.3.0 to 3.3.9, 3.4.0 to 3.4.5, and 3.5.0 to 3.5.3 does not properly authenticate users when invoking API methods, which could allow remote attackers to bypass security checks, change the assigned role of a user, or disconnect users.
References
Link | Resource |
---|---|
http://secunia.com/advisories/16472/ | Patch Vendor Advisory |
http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml | Patch Vendor Advisory |
http://www.securityfocus.com/bid/14585 | Patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21884 | |
http://secunia.com/advisories/16472/ | Patch Vendor Advisory |
http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml | Patch Vendor Advisory |
http://www.securityfocus.com/bid/14585 | Patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/21884 |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/16472/ - Patch, Vendor Advisory | |
References | () http://www.cisco.com/warp/public/707/cisco-sa-20050817-cca.shtml - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/14585 - Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/21884 - |
Information
Published : 2005-08-23 04:00
Updated : 2024-11-21 00:00
NVD link : CVE-2005-2631
Mitre link : CVE-2005-2631
CVE.ORG link : CVE-2005-2631
JSON object : View
Products Affected
cisco
- network_admission_control_manager_and_server_system_software
CWE