Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2011-0963

Overview

Vulnerability Score 5.0 5.0
CVE Id CVE-2011-0963
Last Modified 12 May 2011 12:00:00
Published 31 Mar 2011 06:55:02
Confidentiality Impact PARTIAL PARTIAL
Integrity Impact NONE NONE
Availability Impact NONE NONE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2011-0963

Summary

The default configuration of the RADIUS authentication feature on the Cisco Network Access Control (NAC) Guest Server with software before 2.0.3 allows remote attackers to bypass intended access restrictions and obtain network connectivity via unspecified vectors, aka Bug ID CSCtj66922.

Vulnerable Systems

Application

  • Cisco Nac Guest Server Software 1.0.0

  • Cisco Nac Guest Server Software 1.1.0

  • Cisco Nac Guest Server Software 1.1.1

  • Cisco Nac Guest Server Software 1.1.2

  • Cisco Nac Guest Server Software 1.1.3

  • Cisco Nac Guest Server Software 2.0.0

  • Cisco Nac Guest Server Software 2.0.1

  • Cisco Nac Guest Server Software 2.0.2


References

CISCO - 20110330 Cisco Network Access Control Guest Server System Software Authentication Bypass Vulnerability

SECTRACK - 1025272

CISCO - 20110330 Cisco Network Admission Control Guest Server System Software Authentication Bypass Vulnerability


Last Updated: 27 May 2016 10:56:06