Cisco Secure Access Control System Password Validation Vulnerability
RISK: Medium Risk
TYPE: Security software and application - Security Software & Appliance
A vulnerability has been identified in Cisco Secure Access Control System. A remote user can bypass TACACS+ authentication.
The system does not properly validate user-supplied passwords when TACACS+ is the authentication protocol and the Cisco Secure Access Control System (ACS) is configured with an LDAP external identity store.
A remote user with knowledge of a valid username can send a specially crafted sequence of characters when prompted for the user password to bypass TACACS+ authentication.
Impact
- Security Restriction Bypass
System / Technologies affected
- Versions 5.0, 5.1, 5.2, 5.3
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- The vendor has issued a fix (5.2 Patch 11, 5.3 Patch 7).
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121107-acs
Vulnerability Identifier
Source
Related Link
Share with