CVE-2013-3466

The EAP-FAST authentication module in Cisco Secure Access Control Server (ACS) 4.x before 4.2.1.15.11, when a RADIUS server configuration is enabled, does not properly parse user identities, which allows remote attackers to execute arbitrary commands via crafted EAP-FAST packets, aka Bug ID CSCui57636.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:secure_access_control_server:*:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:4.2.1.15.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:4.2.1.15.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:4.2.1.15.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:4.2.1.15.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:4.2.1.15.4:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:4.2.1.15.6:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:4.2.1.15.7:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:4.2.1.15.8:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:4.2.1.15.9:*:*:*:*:*:*:*

History

21 Nov 2024, 01:53

Type Values Removed Values Added
References () http://osvdb.org/96668 - () http://osvdb.org/96668 -
References () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130828-acs - Vendor Advisory () http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130828-acs - Vendor Advisory
References () http://www.securitytracker.com/id/1028958 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1028958 - Third Party Advisory, VDB Entry

Information

Published : 2013-08-29 12:07

Updated : 2024-11-21 01:53


NVD link : CVE-2013-3466

Mitre link : CVE-2013-3466

CVE.ORG link : CVE-2013-3466


JSON object : View

Products Affected

cisco

  • secure_access_control_server
CWE
CWE-287

Improper Authentication