RADIUS ACLs Vulnerability in Cisco PIX and VPN 3000 Concentrators
CVE-2005-4499
Currently unrated
Key Information:
- Vendor
Cisco
- Vendor
- CVE Published:
- 22 December 2005
What is CVE-2005-4499?
The Downloadable RADIUS ACLs feature within Cisco PIX and VPN 3000 concentrators has a significant flaw that enables remote attackers to gain administrative privileges. When an Access Control List (ACL) is created through the Cisco Secure Access Control Server (CS ACS), a random internal name is generated that inadvertently serves as a hidden username and password. Attackers can intercept the username via the unencrypted text of a RADIUS session and exploit the random password to access other devices integrated with CS ACS, compromising security and network integrity. Implementing strict controls and deploying updates are recommended to mitigate this risk.