Lucene search

K
nvd[email protected]NVD:CVE-2006-3226
HistoryJun 26, 2006 - 4:05 p.m.

CVE-2006-3226

2006-06-2616:05:00
web.nvd.nist.gov

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7 High

AI Score

Confidence

Low

0.111 Low

EPSS

Percentile

95.2%

Cisco Secure Access Control Server (ACS) 4.x for Windows uses the client’s IP address and the server’s port number to grant access to an HTTP server port for an administration session, which allows remote attackers to bypass authentication via various methods, aka “ACS Weak Session Management Vulnerability.”

Affected configurations

NVD
Node
ciscosecure_access_control_serverMatch4.0windows
OR
ciscosecure_access_control_serverMatch4.0.1windows

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

7 High

AI Score

Confidence

Low

0.111 Low

EPSS

Percentile

95.2%

Related for NVD:CVE-2006-3226