Vulnerability: Security Bypass Cisco Secure
Quantity of vulnerabilities: 1
Vector operation: Remote
Impact: Security Bypass
Exploit: functional exploit
Affected Products: Cisco Secure ACS 5.x
– Cisco Secure ACS 5.0;
– Cisco Secure ACS 5.1;
– Cisco Secure ACS 5.2;
– Cisco Secure ACS 5.3.
Which can be exploited by malicious people to bypass certain security restrictions on the target system.
The vulnerability is caused due to improper validation user password authentication protocol TACACS +. This can be a special sequence of characters to bypass the authentication mechanism of the system.
Manufacturer: Cisco Systems, Inc.
Solution: To resolve the vulnerability patch from the manufacturer.