CVE-2006-0764

The Authentication, Authorization, and Accounting (AAA) capability in versions 5.0(1) and 5.0(3) of the software used by multiple Cisco Anomaly Detection and Mitigation products, when running with an incomplete TACACS+ configuration without a "tacacs-server host" command, allows remote attackers to bypass authentication and gain privileges, aka Bug ID CSCsd21455.
Configurations

Configuration 1 (hide)

OR cpe:2.3:h:cisco:anomaly_guard_module:5.0\(1\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:anomaly_guard_module:5.0\(3\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:guard:5.0\(1\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:guard:5.0\(3\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:traffic_anomaly_detector_module:5.0\(1\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:traffic_anomaly_detector_module:5.0\(3\):*:*:*:*:*:*:*

History

No history.

Information

Published : 2006-02-18 02:02

Updated : 2024-02-28 10:42


NVD link : CVE-2006-0764

Mitre link : CVE-2006-0764

CVE.ORG link : CVE-2006-0764


JSON object : View

Products Affected

cisco

  • traffic_anomaly_detector_module
  • anomaly_guard_module
  • guard