Vulnerability Description
Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Secure Access Control Server | 3.3\(1\) |
| Cisco | Secure Acs Solution Engine | All versions |
References
- http://www.ciac.org/ciac/bulletins/p-028.shtmlPatchVendor Advisory
- http://www.cisco.com/warp/public/707/cisco-sa-20041102-acs-eap-tls.shtmlVendor Advisory
- http://www.securityfocus.com/bid/11577PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17936
- http://www.ciac.org/ciac/bulletins/p-028.shtmlPatchVendor Advisory
- http://www.cisco.com/warp/public/707/cisco-sa-20041102-acs-eap-tls.shtmlVendor Advisory
- http://www.securityfocus.com/bid/11577PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/17936
FAQ
What is CVE-2004-1099?
CVE-2004-1099 is a vulnerability with a CVSS score of 10.0 (HIGH). Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly...
How severe is CVE-2004-1099?
CVE-2004-1099 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2004-1099?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Secure Access Control Server, Cisco Secure Acs Solution Engine.