Executive Summary
Summary | |
---|---|
Title | Multiple Vulnerabilities in Cisco Clean Access |
Informations | |||
---|---|---|---|
Name | cisco-sa-20070103-CleanAccess | First vendor Publication | 2006-11-27 |
Vendor | Cisco | Last vendor Modification | 2007-01-03 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Cisco Clean Access (CCA) is a software solution that can automatically detect, isolate, and clean infected or vulnerable devices that attempt to access your network. It consists of Cisco Clean Access Manager (CAM) and Cisco Clean Access Server (CAS) devices that work in tandem. Cisco Clean Access is affected by the following vulnerabilities: Unchangeable shared secret Readable snapshot files |
Original Source
Url : http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
50 % | CWE-255 | Credentials Management |
50 % | CWE-200 | Information Exposure |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
32579 | Cisco Clean Access (CCA) Predictable Snapshots Filename Authentication Bypass Cisco Clean Access contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered by the use of predictable filenames in backing up the database, making the filename easy to guess and download, which will disclose the contents of the database resulting in a loss of confidentiality. |
32578 | Cisco Clean Access (CCA) Shared Secret Authentication Key Persistence Cisco Clean Access (CCA) contains a flaw during initial Clean Access Manager and Clean Access Server setup in which both must share a secret which may not be properly set nor changed. This may allow a malicious user to intercept the default shared secret for all affected devices, providing unauthorized access, resulting in a loss of confidentiality, integrity. |