Vulnerability Details : CVE-2004-1461
Cisco Secure Access Control Server (ACS) 3.2(3) and earlier spawns a separate unauthenticated TCP connection on a random port when a user authenticates to the ACS GUI, which allows remote attackers to bypass authentication by connecting to that port from the same IP address.
Products affected by CVE-2004-1461
- cpe:2.3:a:cisco:secure_access_control_server:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_access_control_server:3.3\(1\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_access_control_server:3.2:*:windows_server:*:*:*:*:*
- cpe:2.3:a:cisco:secure_access_control_server:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_access_control_server:3.2\(3\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_access_control_server:3.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_access_control_server:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_access_control_server:3.2\(1\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_access_control_server:3.2\(2\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_acs_solution_engine:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2004-1461
0.62%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 68 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-1461
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2004-1461
Jump to