Vulnerabilities > CVE-2006-3226 - Authentication Bypass vulnerability in Cisco Secure ACS
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
Cisco Secure Access Control Server (ACS) 4.x for Windows uses the client's IP address and the server's port number to grant access to an HTTP server port for an administration session, which allows remote attackers to bypass authentication via various methods, aka "ACS Weak Session Management Vulnerability."
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 2 |
References
- http://secunia.com/advisories/20816
- http://securityreason.com/securityalert/1157
- http://securitytracker.com/id?1016369
- http://www.cisco.com/en/US/products/sw/secursw/ps2086/tsd_products_security_response09186a00806c68f9.html
- http://www.osvdb.org/26825
- http://www.securityfocus.com/archive/1/438161/100/0/threaded
- http://www.securityfocus.com/archive/1/438258/100/0/threaded
- http://www.securityfocus.com/bid/18621
- http://www.vupen.com/english/advisories/2006/2524
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27328