CVE-2004-1460

Cisco Secure Access Control Server (ACS) 3.2(3) and earlier, when configured with an anonymous bind in Novell Directory Services (NDS) and authenticating NDS users with NDS, allows remote attackers to gain unauthorized access to AAA clients via a blank password.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:cisco:secure_access_control_server:3.0:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:3.1:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:3.2:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:3.2:*:windows_server:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:3.2\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:3.2\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:3.2\(3\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:3.3:*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_access_control_server:3.3\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:secure_acs_solution_engine:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2004-12-31 05:00

Updated : 2023-12-10 10:17


NVD link : CVE-2004-1460

Mitre link : CVE-2004-1460

CVE.ORG link : CVE-2004-1460


JSON object : View

Products Affected

cisco

  • secure_access_control_server
  • secure_acs_solution_engine