The default configuration of the RADIUS authentication feature on the Cisco Network Admission Control (NAC) Guest Server with software prior to 2.0.3 allows remote malicious users to bypass intended access restrictions and obtain network connectivity via unspecified vectors, aka Bug ID CSCtj66922.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco nac_guest_server |
||
cisco nac_guest_server_software 1.1.0 |
||
cisco nac_guest_server_software 1.0.0 |
||
cisco nac_guest_server_software 1.1.2 |
||
cisco nac_guest_server_software 1.1.1 |
||
cisco nac_guest_server_software |
||
cisco nac_guest_server_software 2.0.1 |
||
cisco nac_guest_server_software 2.0.0 |
||
cisco nac_guest_server_software 1.1.3 |