Page 2 of 12 results (0.004 seconds)

CVSS: 9.1EPSS: 0%CPEs: 10EXPL: 0

31 Dec 2004 — Cisco Secure Access Control Server (ACS) 3.2(3) and earlier spawns a separate unauthenticated TCP connection on a random port when a user authenticates to the ACS GUI, which allows remote attackers to bypass authentication by connecting to that port from the same IP address. • http://www.cisco.com/warp/public/707/cisco-sa-20040825-acs.shtml •

CVSS: 10.0EPSS: 10%CPEs: 3EXPL: 0

01 Dec 2004 — Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username. Cisco Secure Access Control Server para Windows (ACS Windows) y Cisco Secure Access Control Server ... • http://www.ciac.org/ciac/bulletins/p-028.shtml •