Vulnerability Name: | CCN-4593 | ||||||
Published: | 2000-05-30 | ||||||
Updated: | 2000-05-30 | ||||||
Summary: | The TACACS+ authentication protocol does not perform sufficient integrity checking on packets. An attacker could modify bits in the packet to alter accounting records during transmission over the network. | ||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||
CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||
Vulnerability Consequences: | Bypass Security | ||||||
References: | Source: CCN Type: Openwall Security Advisory OW-001-tac_plus An Analysis of the TACACS+ Protocol and its Implementations Source: XF Type: UNKNOWN tacacsplus-integrity(4593) | ||||||
Vulnerable Configuration: | Configuration CCN 1:![]() | ||||||
BACK |