Lucene search

K
cve[email protected]CVE-2004-1099
HistoryJan 10, 2005 - 5:00 a.m.

CVE-2004-1099

2005-01-1005:00:00
web.nvd.nist.gov
21
cisco
acs
windows
solution engine
eap-tls
authentication
bypass
cve-2004-1099

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.1 High

AI Score

Confidence

Low

0.023 Low

EPSS

Percentile

89.9%

Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a “cryptographically correct” certificate with valid fields such as the username.

Affected configurations

NVD
Node
ciscosecure_access_control_serverMatch3.3\(1\)
OR
ciscosecure_access_control_serverMatch3.3.1
OR
ciscosecure_acs_solution_engine

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

7.1 High

AI Score

Confidence

Low

0.023 Low

EPSS

Percentile

89.9%