Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2004-1460


Cisco Secure Access Control Server (ACS) 3.2(3) and earlier, when configured with an anonymous bind in Novell Directory Services (NDS) and authenticating NDS users with NDS, allows remote attackers to gain unauthorized access to AAA clients via a blank password.


Published

2004-12-31T05:00:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

6.4

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco secure_access_control_server 3.0 Yes
Application cisco secure_access_control_server 3.1 Yes
Application cisco secure_access_control_server 3.2 Yes
Application cisco secure_access_control_server 3.2 Yes
Application cisco secure_access_control_server 3.2\(1\) Yes
Application cisco secure_access_control_server 3.2\(2\) Yes
Application cisco secure_access_control_server 3.2\(3\) Yes
Application cisco secure_access_control_server 3.3 Yes
Application cisco secure_access_control_server 3.3\(1\) Yes
Application cisco secure_acs_solution_engine * Yes

References