First published: Fri Dec 31 2004(Updated: )
Cisco Secure Access Control Server (ACS) 3.2(3) and earlier, when configured with an anonymous bind in Novell Directory Services (NDS) and authenticating NDS users with NDS, allows remote attackers to gain unauthorized access to AAA clients via a blank password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Access Control Server | =3.0 | |
Cisco Secure Access Control Server | =3.1 | |
Cisco Secure Access Control Server | =3.2 | |
Cisco Secure Access Control Server | =3.2 | |
Cisco Secure Access Control Server | =3.2\(1\) | |
Cisco Secure Access Control Server | =3.2\(2\) | |
Cisco Secure Access Control Server | =3.2\(3\) | |
Cisco Secure Access Control Server | =3.3 | |
Cisco Secure Access Control Server | =3.3\(1\) | |
Cisco Secure ACS Solution Engine |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1460 is considered to be of medium severity due to the potential for unauthorized access.
To fix CVE-2004-1460, reconfigure Cisco Secure Access Control Server to disable anonymous binds and enforce strong authentication methods.
CVE-2004-1460 affects Cisco Secure Access Control Server versions 3.0, 3.1, and 3.2(3) and earlier.
CVE-2004-1460 allows remote attackers to gain unauthorized access to AAA clients through the use of a blank password.
As a workaround for CVE-2004-1460, consider implementing enhanced access controls and monitoring user authentication attempts.