Lucene search

K
cveMitreCVE-2004-1099
HistoryJan 10, 2005 - 5:00 a.m.

CVE-2004-1099

2005-01-1005:00:00
mitre
web.nvd.nist.gov
26
cisco
acs
windows
solution engine
eap-tls
authentication
bypass
cve-2004-1099

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.1

Confidence

Low

EPSS

0.023

Percentile

89.8%

Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a “cryptographically correct” certificate with valid fields such as the username.

Affected configurations

Nvd
Node
ciscosecure_access_control_serverMatch3.3\(1\)
OR
ciscosecure_access_control_serverMatch3.3.1
OR
ciscosecure_acs_solution_engine
VendorProductVersionCPE
ciscosecure_access_control_server3.3(1)cpe:2.3:a:cisco:secure_access_control_server:3.3\(1\):*:*:*:*:*:*:*
ciscosecure_access_control_server3.3.1cpe:2.3:a:cisco:secure_access_control_server:3.3.1:*:*:*:*:*:*:*
ciscosecure_acs_solution_engine*cpe:2.3:a:cisco:secure_acs_solution_engine:*:*:*:*:*:*:*:*

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

AI Score

7.1

Confidence

Low

EPSS

0.023

Percentile

89.8%