Computer Security
[EN] securityvulns.ru no-pyccku


Cisco Network Access Control Guest Server System Software Authentication Bypass
Published:31.03.2011
Source:
SecurityVulns ID:11548
Type:remote
Threat Level:
5/10
Description:Unauthenticated access to protected network is possible.
Affected:CISCO : NAC Guest Server 2.0
CVE:CVE-2011-0963 (The default configuration of the RADIUS authentication feature on the Cisco Network Access Control (NAC) Guest Server with software before 2.0.3 allows remote attackers to bypass intended access restrictions and obtain network connectivity via unspecified vectors, aka Bug ID CSCtj66922.)
Original documentdocumentCISCO, Cisco Security Advisory: Cisco Network Access Control Guest Server System Software Authentication Bypass Vulnerability (31.03.2011)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod