Executive Summary

Summary
Title Multiple Vulnerabilities in Cisco Clean Access
Informations
Name cisco-sa-20070103-CleanAccess First vendor Publication 2006-11-27
Vendor Cisco Last vendor Modification 2007-01-03
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

Cisco Clean Access (CCA) is a software solution that can automatically detect, isolate, and clean infected or vulnerable devices that attempt to access your network. It consists of Cisco Clean Access Manager (CAM) and Cisco Clean Access Server (CAS) devices that work in tandem. Cisco Clean Access is affected by the following vulnerabilities: Unchangeable shared secret Readable snapshot files

Original Source

Url : http://www.cisco.com/warp/public/707/cisco-sa-20070103-CleanAccess.shtml

CWE : Common Weakness Enumeration

% Id Name
50 % CWE-255 Credentials Management
50 % CWE-200 Information Exposure

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 26

Open Source Vulnerability Database (OSVDB)

Id Description
32579 Cisco Clean Access (CCA) Predictable Snapshots Filename Authentication Bypass

Cisco Clean Access contains a flaw that may lead to an unauthorized information disclosure. The issue is triggered by the use of predictable filenames in backing up the database, making the filename easy to guess and download, which will disclose the contents of the database resulting in a loss of confidentiality.
32578 Cisco Clean Access (CCA) Shared Secret Authentication Key Persistence

Cisco Clean Access (CCA) contains a flaw during initial Clean Access Manager and Clean Access Server setup in which both must share a secret which may not be properly set nor changed. This may allow a malicious user to intercept the default shared secret for all affected devices, providing unauthorized access, resulting in a loss of confidentiality, integrity.