Weak Session Management in Cisco Secure Access Control Server 4.x
CVE-2006-3226
Currently unrated
Summary
The Cisco Secure Access Control Server (ACS) 4.x for Windows exhibits a weakness in its session management that leverages the client's IP address and the server's port to permit access for administrative sessions. This oversight potentially enables remote attackers to bypass existing authentication controls, exposing security risks for users and organizations relying on this system for secure access management. The vulnerability highlights the importance of strong session verification mechanisms to safeguard administrative access against unauthorized exploitation.
References
Timeline
Vulnerability published
Vulnerability Reserved