Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2006-0561 | First vendor Publication | 2006-05-09 |
Vendor | Cve | Last vendor Modification | 2017-07-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:L/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.2 | Attack Range | Local |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 3.9 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cisco Secure Access Control Server (ACS) 3.x for Windows stores ACS administrator passwords and the master key in the registry with insecure permissions, which allows local users and remote administrators to decrypt the passwords by using Microsoft's cryptographic API functions to obtain the plaintext version of the master key. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0561 |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
25892 | Cisco Secure ACS Registry Cleartext Authentication Credential Disclosure Cisco Secure ACS contains a flaw that may allow a malicious user to gain access to cleartext passwords. The issue is caused by insecure storage of the master key used to encrypt ACS administrator passwords in the Windows registry. It is possible that the flaw may allow access to administrator passwords resulting in a loss of confidentiality. |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2021-05-04 12:03:41 |
|
2021-04-22 01:04:12 |
|
2020-05-23 00:17:23 |
|
2017-07-20 09:23:20 |
|
2016-06-28 15:36:33 |
|
2013-05-11 10:48:52 |
|