Vulnerability Name:

CVE-2011-0963 (CCN-66470)

Assigned:2011-03-30
Published:2011-03-30
Updated:2016-12-07
Summary:The default configuration of the RADIUS authentication feature on the Cisco Network Admission Control (NAC) Guest Server with software before 2.0.3 allows remote attackers to bypass intended access restrictions and obtain network connectivity via unspecified vectors, aka Bug ID CSCtj66922.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: MITRE
Type: CNA
CVE-2011-0963

Source: CCN
Type: SA43925
Cisco NAC Guest Server RADIUS Authentication Bypass Security Issue

Source: CCN
Type: cisco-sa-20110330-nac
Cisco Network Access Control Guest Server System Software Authentication Bypass Vulnerability

Source: CISCO
Type: UNKNOWN
20110330 Cisco Network Admission Control Guest Server System Software Authentication Bypass Vulnerability

Source: CCN
Type: OSVDB ID: 72608
Cisco Network Admission Control (NAC) Guest Server RADIUS Unspecified Authentication Bypass

Source: CCN
Type: BID-47092
Cisco Network Access Control (NAC) Guest Server RADIUS Authentication Bypass Vulnerability

Source: SECTRACK
Type: UNKNOWN
1025272

Source: XF
Type: UNKNOWN
cisco-nac-radius-security-bypass(66470)

Vulnerable Configuration:Configuration 1:
  • cpe:/h:cisco:nac_guest_server:*:*:*:*:*:*:*:*
  • AND
  • cpe:/a:cisco:nac_guest_server_software:1.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:nac_guest_server_software:1.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:nac_guest_server_software:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:nac_guest_server_software:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:nac_guest_server_software:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:nac_guest_server_software:2.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:nac_guest_server_software:2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:cisco:nac_guest_server_software:*:*:*:*:*:*:*:* (Version <= 2.0.2)

  • * Denotes that component is vulnerable
    BACK
    cisco nac guest server *
    cisco nac guest server software 1.0.0
    cisco nac guest server software 1.1.0
    cisco nac guest server software 1.1.1
    cisco nac guest server software 1.1.2
    cisco nac guest server software 1.1.3
    cisco nac guest server software 2.0.0
    cisco nac guest server software 2.0.1
    cisco nac guest server software *