Executive Summary

Informations
Name CVE-2004-1099 First vendor Publication 2005-01-10
Vendor Cve Last vendor Modification 2018-10-30

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1099

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 2
Application 1

Open Source Vulnerability Database (OSVDB)

Id Description
11379 Cisco Secure Access Control Server EAP-TLS Authentication Bypass

Secure Access Control Server for Windows and Secure Access Control Server Solution Engine, when they are configured to use Extensible Authentication Protocol-Transport Layer Security (EAP-TLS), contain a flaw that may allow an attacker to bypass security authentication. The issue is triggered when the attacker authenticates using a cryptographically correct certificate containing a valid username. It is possible that the flaw may allow the attacker access to the entire network resulting in a loss of confidentiality. Note: this vulnerability is not exploitable if EAP-TLS is configured with binary comparison of user certificates as the only comparison method and if the user entry in Lightweight Directory Access Protocol/Active Directory (LDAP/AD) contains only valid certificates.

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/11577
CIAC http://www.ciac.org/ciac/bulletins/p-028.shtml
CISCO http://www.cisco.com/warp/public/707/cisco-sa-20041102-acs-eap-tls.shtml
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/17936

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
Date Informations
2024-02-02 01:02:39
  • Multiple Updates
2024-02-01 12:01:34
  • Multiple Updates
2023-09-05 12:02:31
  • Multiple Updates
2023-09-05 01:01:26
  • Multiple Updates
2023-09-02 12:02:33
  • Multiple Updates
2023-09-02 01:01:25
  • Multiple Updates
2023-08-12 12:03:04
  • Multiple Updates
2023-08-12 01:01:26
  • Multiple Updates
2023-08-11 12:02:39
  • Multiple Updates
2023-08-11 01:01:27
  • Multiple Updates
2023-08-06 12:02:27
  • Multiple Updates
2023-08-06 01:01:27
  • Multiple Updates
2023-08-04 12:02:31
  • Multiple Updates
2023-08-04 01:01:27
  • Multiple Updates
2023-07-14 12:02:29
  • Multiple Updates
2023-07-14 01:01:27
  • Multiple Updates
2023-03-29 01:02:31
  • Multiple Updates
2023-03-28 12:01:32
  • Multiple Updates
2022-10-11 12:02:13
  • Multiple Updates
2022-10-11 01:01:19
  • Multiple Updates
2021-05-04 12:02:27
  • Multiple Updates
2021-04-22 01:02:37
  • Multiple Updates
2020-05-23 00:15:57
  • Multiple Updates
2018-10-31 00:19:44
  • Multiple Updates
2017-07-11 12:01:33
  • Multiple Updates
2016-06-28 15:06:38
  • Multiple Updates
2013-05-11 11:43:50
  • Multiple Updates