First published: Tue Sep 26 2006(Updated: )
Symantec Sygate NAC allows physically proximate attackers to bypass control methods and join a local network by selecting a forged MAC address associated with an exception rule that (1) permits all non-Windows devices or (2) whitelists certain sets of Organizationally Unique Identifiers (OUIs).
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Sygate Network Access Control |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4981 is classified as having medium severity due to the risk it poses to network security by allowing unauthorized access.
To mitigate CVE-2006-4981, ensure that exception rules for non-Windows devices are properly configured and restrict MAC address spoofing.
CVE-2006-4981 affects users of Symantec Sygate Network Access Control who have implemented exception rules for network access.
Attackers can exploit CVE-2006-4981 by forging MAC addresses to bypass access controls through exception rules.
There is no specific patch for CVE-2006-4981, but it is recommended to review and strengthen network security configurations.