Cisco Secure Access Control Server (ACS) 3.2(3) and earlier spawns a separate unauthenticated TCP connection on a random port when a user authenticates to the ACS GUI, which allows remote attackers to bypass authentication by connecting to that port from the same IP address.
2004-12-31T05:00:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cisco | secure_access_control_server | 3.0 | Yes |
Application | cisco | secure_access_control_server | 3.1 | Yes |
Application | cisco | secure_access_control_server | 3.2 | Yes |
Application | cisco | secure_access_control_server | 3.2 | Yes |
Application | cisco | secure_access_control_server | 3.2\(1\) | Yes |
Application | cisco | secure_access_control_server | 3.2\(2\) | Yes |
Application | cisco | secure_access_control_server | 3.2\(3\) | Yes |
Application | cisco | secure_access_control_server | 3.3 | Yes |
Application | cisco | secure_access_control_server | 3.3\(1\) | Yes |
Application | cisco | secure_acs_solution_engine | * | Yes |