CVE-2006-0764
Published Feb 18, 2006
Last updated 7 years ago
Overview
- Description
- The Authentication, Authorization, and Accounting (AAA) capability in versions 5.0(1) and 5.0(3) of the software used by multiple Cisco Anomaly Detection and Mitigation products, when running with an incomplete TACACS+ configuration without a "tacacs-server host" command, allows remote attackers to bypass authentication and gain privileges, aka Bug ID CSCsd21455.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.1
- Impact score
- 6.4
- Exploitability score
- 4.9
- Vector string
- AV:N/AC:H/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:anomaly_guard_module:5.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B4C301D-823C-4FDF-A7A0-9D79795434B1" }, { "criteria": "cpe:2.3:h:cisco:anomaly_guard_module:5.0\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BBCF99E5-AF88-48AD-8FFB-661E6A739E75" }, { "criteria": "cpe:2.3:h:cisco:guard:5.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A04EE20-46BB-41AA-A7B1-005B236F3E46" }, { "criteria": "cpe:2.3:h:cisco:guard:5.0\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "730FF7D5-AFD4-4CF8-A8B3-8679D8A3A0CC" }, { "criteria": "cpe:2.3:h:cisco:traffic_anomaly_detector_module:5.0\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "216B68DF-9614-42F2-A84D-1617AA9AD097" }, { "criteria": "cpe:2.3:h:cisco:traffic_anomaly_detector_module:5.0\\(3\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EC7DA209-1807-4F7C-8BAD-5A4297D5F116" } ], "operator": "OR" } ] } ]