Total vulnerabilities in the database
Cisco Secure Access Control Server (ACS) 3.2(3) and earlier spawns a separate unauthenticated TCP connection on a random port when a user authenticates to the ACS GUI, which allows remote attackers to bypass authentication by connecting to that port from the same IP address.
Software | From | Fixed in |
---|---|---|
cisco / secure_access_control_server | 3.2 | 3.2.x |
cisco / secure_acs_solution_engine | - | - |
cisco / secure_access_control_server | 3.3(1) | 3.3(1).x |
cisco / secure_access_control_server | 3.0 | 3.0.x |
cisco / secure_access_control_server | 3.1 | 3.1.x |
cisco / secure_access_control_server | 3.3 | 3.3.x |
cisco / secure_access_control_server | 3.2(3) | 3.2(3).x |
cisco / secure_access_control_server | 3.2(1) | 3.2(1).x |
cisco / secure_access_control_server | 3.2(2) | 3.2(2).x |