pix_firewall,vpn_3000_concentrator,vpn_3001_concentrator,pix_firewall_535,secure_access_control_server,adaptive_security_appliance,vpn_3005_concentrator,vpn_3020_concentrator,vpn_3080_concentrator,vpn_3060_concentrator,pix_firewall_525,vpn_3002_hardware_client,pix_firewall_520,pix_asa_ids,vpn_3030_concentator,pix_firewall_515,vpn_3015_concentrator,pix_firewall_506,pix_firewall_501,pix_firewall_515e 权限提升漏洞
CVE编号
CVE-2005-4499利用情况
暂无补丁情况
N/A披露时间
2005-12-23漏洞描述
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。受影响软件情况
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 N/A
- 用户交互 无
- 可用性 部分地
- 保密性 部分地
- 完整性 部分地
CWE-ID | 漏洞类型 |
NVD-CWE-Other |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论