RADIUS ACLs Vulnerability in Cisco PIX and VPN 3000 Concentrators
CVE-2005-4499

Currently unrated

Key Information:

Vendor
Cisco
Vendor
CVE Published:
22 December 2005

Summary

The Downloadable RADIUS ACLs feature within Cisco PIX and VPN 3000 concentrators has a significant flaw that enables remote attackers to gain administrative privileges. When an Access Control List (ACL) is created through the Cisco Secure Access Control Server (CS ACS), a random internal name is generated that inadvertently serves as a hidden username and password. Attackers can intercept the username via the unencrypted text of a RADIUS session and exploit the random password to access other devices integrated with CS ACS, compromising security and network integrity. Implementing strict controls and deploying updates are recommended to mitigate this risk.

References

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.