CVE-2004-1099
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
10/01/2005
Last modified:
03/04/2025
Description
Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cisco:secure_access_control_server:3.3\(1\):*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:secure_access_control_server:3.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:secure_acs_solution_engine:*:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.ciac.org/ciac/bulletins/p-028.shtml
- http://www.cisco.com/warp/public/707/cisco-sa-20041102-acs-eap-tls.shtml
- http://www.securityfocus.com/bid/11577
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17936
- http://www.ciac.org/ciac/bulletins/p-028.shtml
- http://www.cisco.com/warp/public/707/cisco-sa-20041102-acs-eap-tls.shtml
- http://www.securityfocus.com/bid/11577
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17936