Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2006-0764


The Authentication, Authorization, and Accounting (AAA) capability in versions 5.0(1) and 5.0(3) of the software used by multiple Cisco Anomaly Detection and Mitigation products, when running with an incomplete TACACS+ configuration without a "tacacs-server host" command, allows remote attackers to bypass authentication and gain privileges, aka Bug ID CSCsd21455.


Published

2006-02-18T02:02:00.000

Last Modified

2025-04-03T01:03:51.193

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 5.1 (MEDIUM)

CVSSv2 Vector

AV:N/AC:H/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: HIGH
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

4.9

Impact Score

6.4

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Hardware cisco anomaly_guard_module 5.0\(1\) Yes
Hardware cisco anomaly_guard_module 5.0\(3\) Yes
Hardware cisco guard 5.0\(1\) Yes
Hardware cisco guard 5.0\(3\) Yes
Hardware cisco traffic_anomaly_detector_module 5.0\(1\) Yes
Hardware cisco traffic_anomaly_detector_module 5.0\(3\) Yes

References