5.1
CVSSv2

CVE-2006-0764

Published: 18/02/2006 Updated: 20/07/2017
CVSS v2 Base Score: 5.1 | Impact Score: 6.4 | Exploitability Score: 4.9
VMScore: 454
Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P

Vulnerability Summary

The Authentication, Authorization, and Accounting (AAA) capability in versions 5.0(1) and 5.0(3) of the software used by multiple Cisco Anomaly Detection and Mitigation products, when running with an incomplete TACACS+ configuration without a "tacacs-server host" command, allows remote malicious users to bypass authentication and gain privileges, aka Bug ID CSCsd21455.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco guard 5.0\\(1\\)

cisco guard 5.0\\(3\\)

cisco traffic anomaly detector module 5.0\\(1\\)

cisco traffic anomaly detector module 5.0\\(3\\)

cisco anomaly guard module 5.0\\(1\\)

cisco anomaly guard module 5.0\\(3\\)

Vendor Advisories

A vulnerability in versions 50(1) and 50(3) of the software used in Cisco Anomaly Detection and Mitigation appliances and service modules may allow unauthorized users to get unauthorized access to the devices and/or escalate their privileges if Terminal Access Controller Access Control System Plus (TACACS+) is incompletely configured ...