First published: Thu Feb 22 2007(Updated: )
The (1) TTLS CHAP, (2) TTLS MSCHAP, (3) TTLS MSCHAPv2, (4) TTLS PAP, (5) MD5, (6) GTC, (7) LEAP, (8) PEAP MSCHAPv2, (9) PEAP GTC, and (10) FAST authentication methods in Cisco Secure Services Client (CSSC) 4.x, Trust Agent 1.x and 2.x, Cisco Security Agent (CSA) 5.0 and 5.1 (when a vulnerable Trust Agent has been deployed), and the Meetinghouse AEGIS SecureConnect Client store transmitted authentication credentials in plaintext log files, which allows local users to obtain sensitive information by reading these files, aka CSCsg34423.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Trust Agent | =2.0 | |
Cisco Security Agent | =5.1 | |
Cisco Security Agent | =5.0 | |
Cisco Secure | =4.0.51 | |
Cisco Secure | =4.0 | |
Cisco Trust Agent | =2.0.1 | |
Meetinghouse AEGIS SecureConnect Client | =windows_platform | |
Cisco Trust Agent | =2.1 | |
Cisco Trust Agent | =1.0 | |
Cisco Secure | =4.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1068 is rated as a moderate severity vulnerability.
To fix CVE-2007-1068, you should upgrade to the latest versions of the affected Cisco products and apply any available patches.
CVE-2007-1068 affects Cisco Secure Services Client 4.x, Cisco Trust Agent 1.x and 2.x, and Cisco Security Agent 5.0 and 5.1.
CVE-2007-1068 affects multiple authentication methods including TTLS CHAP, TTLS MSCHAP, PEAP MSCHAPv2, and others.
Yes, CVE-2007-1068 remains a risk if vulnerable versions of the affected Cisco software are still in use.