Vulnerability Details : CVE-2004-1099
Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username.
Vulnerability category: Bypass
Products affected by CVE-2004-1099
- cpe:2.3:a:cisco:secure_access_control_server:3.3\(1\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_access_control_server:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_acs_solution_engine:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-1099
10.73%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-1099
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2004-1099
-
http://www.ciac.org/ciac/bulletins/p-028.shtml
Patch;Vendor Advisory
-
http://www.cisco.com/warp/public/707/cisco-sa-20041102-acs-eap-tls.shtml
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17936
-
http://www.securityfocus.com/bid/11577
Patch;Vendor Advisory
Jump to