CVE-2011-0963
Published Mar 31, 2011
Last updated 8 years ago
Overview
- Description
- The default configuration of the RADIUS authentication feature on the Cisco Network Admission Control (NAC) Guest Server with software before 2.0.3 allows remote attackers to bypass intended access restrictions and obtain network connectivity via unspecified vectors, aka Bug ID CSCtj66922.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nac_guest_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0948BDF8-94FA-4911-907A-6D0B1A820472" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:nac_guest_server_software:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "495B5D55-0941-451B-998E-41E6FEC17E16", "versionEndIncluding": "2.0.2" }, { "criteria": "cpe:2.3:a:cisco:nac_guest_server_software:1.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "AFC043FE-B7C8-416A-985D-18C2FC59E780" }, { "criteria": "cpe:2.3:a:cisco:nac_guest_server_software:1.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5587EBF9-CB6E-4429-BC1A-E029657160E7" }, { "criteria": "cpe:2.3:a:cisco:nac_guest_server_software:1.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7297C9B5-E37E-48A6-B5FB-87EEBF25EC63" }, { "criteria": "cpe:2.3:a:cisco:nac_guest_server_software:1.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9C63282-A4E2-4BC4-93B8-B2CBF3ABE4C8" }, { "criteria": "cpe:2.3:a:cisco:nac_guest_server_software:1.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DAE1F91B-37A0-4992-AE23-1E0473243F3C" }, { "criteria": "cpe:2.3:a:cisco:nac_guest_server_software:2.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E06B4395-92AA-4DE3-B4B5-D48843BF850B" }, { "criteria": "cpe:2.3:a:cisco:nac_guest_server_software:2.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "294DCA83-6F8F-4381-85DD-0C1FF66537A8" } ], "operator": "OR" } ], "operator": "AND" } ]