Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-3466


The EAP-FAST authentication module in Cisco Secure Access Control Server (ACS) 4.x before 4.2.1.15.11, when a RADIUS server configuration is enabled, does not properly parse user identities, which allows remote attackers to execute arbitrary commands via crafted EAP-FAST packets, aka Bug ID CSCui57636.


Published

2013-08-29T12:07:53.977

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 9.3 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

8.6

Impact Score

10.0

Weaknesses
  • Type: Primary
    CWE-287

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application cisco secure_access_control_server ≤ 4.2.1.15.10 Yes
Application cisco secure_access_control_server 4.2.1.15.0 Yes
Application cisco secure_access_control_server 4.2.1.15.1 Yes
Application cisco secure_access_control_server 4.2.1.15.2 Yes
Application cisco secure_access_control_server 4.2.1.15.3 Yes
Application cisco secure_access_control_server 4.2.1.15.4 Yes
Application cisco secure_access_control_server 4.2.1.15.6 Yes
Application cisco secure_access_control_server 4.2.1.15.7 Yes
Application cisco secure_access_control_server 4.2.1.15.8 Yes
Application cisco secure_access_control_server 4.2.1.15.9 Yes

References