Cisco » Vpn 3030 Concentator : Security Vulnerabilities, CVEs, Published In 2005
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.
Max CVSS
7.5
EPSS Score
1.34%
Published
2005-12-22
Updated
2023-08-11
Cisco VPN 3000 Concentrator before 4.1.7.F allows remote attackers to determine valid groupnames by sending an IKE Aggressive Mode packet with the groupname in the ID field, which generates a response if the groupname is valid, but does not generate a response for an invalid groupname.
Max CVSS
5.0
EPSS Score
0.50%
Published
2005-06-20
Updated
2018-10-30
Cisco VPN 3000 series Concentrator running firmware 4.1.7.A and earlier allows remote attackers to cause a denial of service (device reload or drop user connection) via a crafted HTTPS packet.
Max CVSS
5.0
EPSS Score
0.41%
Published
2005-03-30
Updated
2018-10-30
3 vulnerabilities found