15 results (0.008 seconds)

CVSS: 9.8EPSS: 1%CPEs: 156EXPL: 0

22 Dec 2005 — The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS. • http://secunia.com/advisories/18141 •

CVSS: 7.5EPSS: 0%CPEs: 45EXPL: 0

30 Mar 2005 — Cisco VPN 3000 series Concentrator running firmware 4.1.7.A and earlier allows remote attackers to cause a denial of service (device reload or drop user connection) via a crafted HTTPS packet. • http://secunia.com/advisories/14784 •

CVSS: 7.5EPSS: 0%CPEs: 23EXPL: 0

08 May 2003 — Cisco VPN 3000 series concentrators and Cisco VPN 3002 Hardware Client 3.5.x through 4.0.REL, when enabling IPSec over TCP for a port on the concentrator, allow remote attackers to reach the private network without authentication. Concentradores de Cisco de la serie VPN 3000 y Cisco VPN 3002 Hardware Client 2.x.x hasta 4.0.REL, cuando se configuran para permitir IPSec sobre TCP para un puerto del concentrador, permiten que atacantes remotos alcancen la red privada sin autentificación. • http://www.cisco.com/warp/public/707/cisco-sa-20030507-vpn3k.shtml •

CVSS: 7.5EPSS: 0%CPEs: 36EXPL: 0

08 May 2003 — Cisco VPN 3000 series concentrators and Cisco VPN 3002 Hardware Client 2.x.x through 3.6.7 allows remote attackers to cause a denial of service (reload) via a malformed SSH initialization packet. Concentradores de Cisco de la serie VPN 3000 y Cisco VPN 3002 Hardware Client 2.x.x hasta 3.6.7 permiten que atacantes remotos causen una denegación de servicio (recarga) mediante un paquete de inicialización SSH mal construído. • http://www.cisco.com/warp/public/707/cisco-sa-20030507-vpn3k.shtml •

CVSS: 7.5EPSS: 0%CPEs: 31EXPL: 0

08 May 2003 — Cisco VPN 3000 series concentrators and Cisco VPN 3002 Hardware Client 2.x.x through 3.6.7A allow remote attackers to cause a denial of service (slowdown and possibly reload) via a flood of malformed ICMP packets. Concentradores de Cisco de la serie VPN 3000 y Cisco VPN 3002 Hardware Client 2.x.x hasta 3.6.7A permiten que atacantes remotos causen una denegación de servicio (ralentización y posiblemente recarga) mediante una inundación con paquetes ICMP mal construídos. • http://www.cisco.com/warp/public/707/cisco-sa-20030507-vpn3k.shtml •

CVSS: 7.5EPSS: 0%CPEs: 7EXPL: 0

04 Oct 2002 — Cisco VPN 3000 Concentrator before 2.5.2(F), with encryption enabled, allows remote attackers to cause a denial of service (reload) via a Windows-based PPTP client with the "No Encryption" option set. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml •

CVSS: 7.5EPSS: 0%CPEs: 17EXPL: 0

04 Oct 2002 — Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.1, allows restricted administrators to obtain user passwords that are stored in plaintext in HTML source code. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml •

CVSS: 7.5EPSS: 0%CPEs: 17EXPL: 0

04 Oct 2002 — Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.2, allows restricted administrators to obtain certificate passwords that are stored in plaintext in the HTML source code for Certificate Management pages. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml •

CVSS: 9.8EPSS: 0%CPEs: 20EXPL: 0

04 Oct 2002 — Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, adds an "HTTPS on Public Inbound (XML-Auto)(forward/in)" rule but sets the protocol to "ANY" when the XML filter configuration is enabled, which ultimately allows arbitrary traffic to pass through the concentrator. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml •

CVSS: 7.5EPSS: 0%CPEs: 20EXPL: 0

04 Oct 2002 — Cisco VPN 3000 Concentrator 2.2.x, and 3.x before 3.5.3, allows remote attackers to obtain potentially sensitive information without authentication by directly accessing certain HTML pages. • http://www.cisco.com/warp/public/707/vpn3k-multiple-vuln-pub.shtml •