Cisco Secure Access Control Server (ACS) 4.x for Windows uses the client's IP address and the server's port number to grant access to an HTTP server port for an administration session, which allows remote attackers to bypass authentication via various methods, aka "ACS Weak Session Management Vulnerability."
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:13
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/20816 - | |
References | () http://securityreason.com/securityalert/1157 - | |
References | () http://securitytracker.com/id?1016369 - | |
References | () http://www.cisco.com/en/US/products/sw/secursw/ps2086/tsd_products_security_response09186a00806c68f9.html - Vendor Advisory | |
References | () http://www.osvdb.org/26825 - | |
References | () http://www.securityfocus.com/archive/1/438161/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/438258/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/18621 - | |
References | () http://www.vupen.com/english/advisories/2006/2524 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27328 - |
Information
Published : 2006-06-26 16:05
Updated : 2024-11-21 00:13
NVD link : CVE-2006-3226
Mitre link : CVE-2006-3226
CVE.ORG link : CVE-2006-3226
JSON object : View
Products Affected
cisco
- secure_access_control_server
CWE