Cisco Network Admission Control (NAC) Appliance 3.5.x, 3.6.x before 3.6.4.4, 4.0.x before 4.0.6, and 4.1.x before 4.1.2 allows remote attackers to obtain the shared secret for the Clean Access Server (CAS) and Clean Access Manager (CAM) by sniffing error logs.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/29822 - Vendor Advisory | |
References | () http://www.cisco.com/en/US/products/products_security_advisory09186a008097bea0.shtml - Patch, Vendor Advisory | |
References | () http://www.securityfocus.com/bid/28807 - | |
References | () http://www.securitytracker.com/id?1019859 - | |
References | () http://www.vupen.com/english/advisories/2008/1248/references - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/41849 - |
Information
Published : 2008-04-16 17:05
Updated : 2024-11-21 00:43
NVD link : CVE-2008-1155
Mitre link : CVE-2008-1155
CVE.ORG link : CVE-2008-1155
JSON object : View
Products Affected
cisco
- network_admission_control
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor