5
CVSSv2

CVE-2011-0963

Published: 31/03/2011 Updated: 07/12/2016
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The default configuration of the RADIUS authentication feature on the Cisco Network Admission Control (NAC) Guest Server with software prior to 2.0.3 allows remote malicious users to bypass intended access restrictions and obtain network connectivity via unspecified vectors, aka Bug ID CSCtj66922.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco nac_guest_server

cisco nac_guest_server_software 1.1.0

cisco nac_guest_server_software 1.0.0

cisco nac_guest_server_software 1.1.2

cisco nac_guest_server_software 1.1.1

cisco nac_guest_server_software

cisco nac_guest_server_software 2.0.1

cisco nac_guest_server_software 2.0.0

cisco nac_guest_server_software 1.1.3

Vendor Advisories

Cisco Network Admission Control (NAC) Guest Server system software contains a vulnerability in the RADIUS authentication software that may allow an unauthenticated user to access the protected network Cisco has released software updates that address this vulnerability This advisory is posted at toolsciscocom/security/center/content/Cis ...