CVE-2006-4430
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
29/08/2006
Last modified:
03/04/2025
Description
The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack. NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:cisco:network_admission_control:*:*:*:*:*:*:*:* | 3.6.4.1 (including) | |
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.8:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.9:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html
- http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html
- http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html
- http://www.securityfocus.com/archive/1/408603/30/0/threaded
- http://www.securityfocus.com/archive/1/444424/100/0/threaded
- http://www.securityfocus.com/archive/1/444501/100/0/threaded
- http://www.securityfocus.com/archive/1/444737/100/0/threaded
- http://www.securityfocus.com/bid/19726
- http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html
- http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html
- http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html
- http://www.securityfocus.com/archive/1/408603/30/0/threaded
- http://www.securityfocus.com/archive/1/444424/100/0/threaded
- http://www.securityfocus.com/archive/1/444501/100/0/threaded
- http://www.securityfocus.com/archive/1/444737/100/0/threaded
- http://www.securityfocus.com/bid/19726