CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
AI Score
Confidence
Low
EPSS
Percentile
56.7%
The default configuration of the RADIUS authentication feature on the Cisco Network Admission Control (NAC) Guest Server with software before 2.0.3 allows remote attackers to bypass intended access restrictions and obtain network connectivity via unspecified vectors, aka Bug ID CSCtj66922.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | nac_guest_server | * | cpe:2.3:h:cisco:nac_guest_server:*:*:*:*:*:*:*:* |
cisco | nac_guest_server_software | * | cpe:2.3:a:cisco:nac_guest_server_software:*:*:*:*:*:*:*:* |
cisco | nac_guest_server_software | 1.0.0 | cpe:2.3:a:cisco:nac_guest_server_software:1.0.0:*:*:*:*:*:*:* |
cisco | nac_guest_server_software | 1.1.0 | cpe:2.3:a:cisco:nac_guest_server_software:1.1.0:*:*:*:*:*:*:* |
cisco | nac_guest_server_software | 1.1.1 | cpe:2.3:a:cisco:nac_guest_server_software:1.1.1:*:*:*:*:*:*:* |
cisco | nac_guest_server_software | 1.1.2 | cpe:2.3:a:cisco:nac_guest_server_software:1.1.2:*:*:*:*:*:*:* |
cisco | nac_guest_server_software | 1.1.3 | cpe:2.3:a:cisco:nac_guest_server_software:1.1.3:*:*:*:*:*:*:* |
cisco | nac_guest_server_software | 2.0.0 | cpe:2.3:a:cisco:nac_guest_server_software:2.0.0:*:*:*:*:*:*:* |
cisco | nac_guest_server_software | 2.0.1 | cpe:2.3:a:cisco:nac_guest_server_software:2.0.1:*:*:*:*:*:*:* |