RADIUS ACLs Vulnerability in Cisco PIX and VPN 3000 Concentrators
CVE-2005-4499
Currently unrated
Key Information:
- Vendor
- Cisco
- Vendor
- CVE Published:
- 22 December 2005
Summary
The Downloadable RADIUS ACLs feature within Cisco PIX and VPN 3000 concentrators has a significant flaw that enables remote attackers to gain administrative privileges. When an Access Control List (ACL) is created through the Cisco Secure Access Control Server (CS ACS), a random internal name is generated that inadvertently serves as a hidden username and password. Attackers can intercept the username via the unencrypted text of a RADIUS session and exploit the random password to access other devices integrated with CS ACS, compromising security and network integrity. Implementing strict controls and deploying updates are recommended to mitigate this risk.
References
Timeline
Vulnerability published
Vulnerability Reserved