Description
Cisco Secure Access Control Server (ACS) 3.2(3) and earlier, when configured with an anonymous bind in Novell Directory Services (NDS) and authenticating NDS users with NDS, allows remote attackers to gain unauthorized access to AAA clients via a blank password.
Product(s):
- Cisco Secure Access Control Server (ACS) 3.0 for Windows
- Cisco Secure Access Control Server (ACS) 3.1 for Windows
- Cisco Secure Access Control Server 3.2
- Cisco Secure Access Control Server 3.2 for Windows Server
- Cisco Secure Access Control Server (ACS) 3.2 for Windows
- Cisco Secure Access Control Server (ACS) 3.2 (1) for Windows
- Cisco Secure Access Control Server (ACS) 3.2 (2) for Windows
- Cisco Secure Access Control Server (ACS) 3.2 (2) build 15 for Windows
- Cisco Secure Access Control Server (ACS) 3.2 (3) for Windows
- Cisco Secure Access Control Server 3.3
- Cisco Secure Access Control Server (ACS) 3.3 for Windows
- Cisco Secure Access Control Server (ACS) 3.3(1) for Windows
- Cisco Secure ACS Solution Engine
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2004-1460, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2004-1460 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.