The Authentication, Authorization, and Accounting (AAA) capability in versions 5.0(1) and 5.0(3) of the software used by multiple Cisco Anomaly Detection and Mitigation products, when running with an incomplete TACACS+ configuration without a "tacacs-server host" command, allows remote attackers to bypass authentication and gain privileges, aka Bug ID CSCsd21455.
2006-02-18T02:02:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 5.1 (MEDIUM)
AV:N/AC:H/Au:N/C:P/I:P/A:P
4.9
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Hardware | cisco | anomaly_guard_module | 5.0\(1\) | Yes |
Hardware | cisco | anomaly_guard_module | 5.0\(3\) | Yes |
Hardware | cisco | guard | 5.0\(1\) | Yes |
Hardware | cisco | guard | 5.0\(3\) | Yes |
Hardware | cisco | traffic_anomaly_detector_module | 5.0\(1\) | Yes |
Hardware | cisco | traffic_anomaly_detector_module | 5.0\(3\) | Yes |