CVE-2009-1135
Published Jul 15, 2009
Last updated 6 years ago
Overview
- Description
- Microsoft Internet Security and Acceleration (ISA) Server 2006 Gold and SP1, when Radius OTP is enabled, uses the HTTP-Basic authentication method, which allows remote attackers to gain the privileges of an arbitrary account, and access published web pages, via vectors involving attempted access to a network resource behind the ISA Server, aka "Radius OTP Bypass Vulnerability."
- Source
- secure@microsoft.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9
- Impact score
- 10
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:microsoft:isa_server:2006:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9552EF3-4A85-4F2A-927B-B485BBDB5BEF" }, { "criteria": "cpe:2.3:a:microsoft:isa_server:2006:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2B6CDFF-1DA8-43A1-8363-77F4365852D5" }, { "criteria": "cpe:2.3:a:microsoft:isa_server:2006:supportability:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82E6155D-37B4-477D-980E-E1ECEC2E6CAE" } ], "operator": "OR" } ] } ]