Lucene search

K
cve[email protected]CVE-2013-3466
HistoryAug 29, 2013 - 12:07 p.m.

CVE-2013-3466

2013-08-2912:07:53
CWE-287
web.nvd.nist.gov
19
cve-2013-3466
cisco
secure access control server
acs
radius
eap-fast
authentication
remote attack
arbitrary commands
vulnerability

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8 High

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

76.6%

The EAP-FAST authentication module in Cisco Secure Access Control Server (ACS) 4.x before 4.2.1.15.11, when a RADIUS server configuration is enabled, does not properly parse user identities, which allows remote attackers to execute arbitrary commands via crafted EAP-FAST packets, aka Bug ID CSCui57636.

Affected configurations

NVD
Node
ciscosecure_access_control_serverRange4.2.1.15.10
OR
ciscosecure_access_control_serverMatch4.2.1.15.0
OR
ciscosecure_access_control_serverMatch4.2.1.15.1
OR
ciscosecure_access_control_serverMatch4.2.1.15.2
OR
ciscosecure_access_control_serverMatch4.2.1.15.3
OR
ciscosecure_access_control_serverMatch4.2.1.15.4
OR
ciscosecure_access_control_serverMatch4.2.1.15.6
OR
ciscosecure_access_control_serverMatch4.2.1.15.7
OR
ciscosecure_access_control_serverMatch4.2.1.15.8
OR
ciscosecure_access_control_serverMatch4.2.1.15.9

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

8 High

AI Score

Confidence

Low

0.005 Low

EPSS

Percentile

76.6%