First published: Tue May 09 2006(Updated: )
Cisco Secure Access Control Server (ACS) 3.x for Windows stores ACS administrator passwords and the master key in the registry with insecure permissions, which allows local users and remote administrators to decrypt the passwords by using Microsoft's cryptographic API functions to obtain the plaintext version of the master key.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure Access Control Server | =3.2 | |
Cisco Secure Access Control Server | =3.1.1 | |
Cisco Secure Access Control Server | =3.0.1 | |
Cisco Secure Access Control Server | =3.0.3 | |
Cisco Secure Access Control Server | =3.3 | |
Cisco Secure Access Control Server | =3.2 | |
Cisco Secure Access Control Server | =3.1 | |
Cisco Secure Access Control Server | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0561 is classified as a medium severity vulnerability.
To fix CVE-2006-0561, ensure that administrator passwords and master keys are stored with secure permissions and apply any available patches from Cisco.
CVE-2006-0561 affects Cisco Secure Access Control Server versions 3.0, 3.0.1, 3.0.3, 3.1, 3.1.1, 3.2, and 3.3.
CVE-2006-0561 allows local users and remote administrators to decrypt sensitive passwords due to insecure storage.
Yes, CVE-2006-0561 is related to insecure permissions in the Windows registry where Cisco Secure Access Control Server stores sensitive information.