FKIE_CVE-2006-4430

Vulnerability from fkie_nvd - Published: 2006-08-29 00:04 - Updated: 2025-04-03 01:03
Severity ?
Summary
The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack. NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms.
Impacted products
Vendor Product Version
cisco network_admission_control *
cisco network_admission_control_manager_and_server_system_software 3.3
cisco network_admission_control_manager_and_server_system_software 3.3.1
cisco network_admission_control_manager_and_server_system_software 3.3.2
cisco network_admission_control_manager_and_server_system_software 3.3.3
cisco network_admission_control_manager_and_server_system_software 3.3.4
cisco network_admission_control_manager_and_server_system_software 3.3.5
cisco network_admission_control_manager_and_server_system_software 3.3.6
cisco network_admission_control_manager_and_server_system_software 3.3.7
cisco network_admission_control_manager_and_server_system_software 3.3.8
cisco network_admission_control_manager_and_server_system_software 3.3.9
cisco network_admission_control_manager_and_server_system_software 3.4
cisco network_admission_control_manager_and_server_system_software 3.4.1
cisco network_admission_control_manager_and_server_system_software 3.4.2
cisco network_admission_control_manager_and_server_system_software 3.4.3
cisco network_admission_control_manager_and_server_system_software 3.4.4
cisco network_admission_control_manager_and_server_system_software 3.4.5
cisco network_admission_control_manager_and_server_system_software 3.5
cisco network_admission_control_manager_and_server_system_software 3.5\(9\)
cisco network_admission_control_manager_and_server_system_software 3.5.1
cisco network_admission_control_manager_and_server_system_software 3.5.2
cisco network_admission_control_manager_and_server_system_software 3.5.3
cisco network_admission_control_manager_and_server_system_software 3.5.4
cisco network_admission_control_manager_and_server_system_software 3.5.5
cisco network_admission_control_manager_and_server_system_software 3.6.0.1
cisco network_admission_control_manager_and_server_system_software 3.6.4.0.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ABB4C62-1CF7-4280-B084-2C7EB3C7198C",
              "versionEndIncluding": "3.6.4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D17AF7C3-3453-4343-AC57-B3BAACAD36E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D20F5D1-C28A-4D0E-B4BA-3F8A9B05933E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FA3ABF2-F8D7-4D46-8862-072AD105AE5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "28B34BF7-B96E-4C6A-B6BD-803680629300",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "280C9607-98C6-44CE-9017-43592EC9D013",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F972C202-DEEB-49AD-BBE7-442CA0E975E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "028ABC18-8944-474C-8482-2DC4F0E0B51B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD764CC4-F985-4A2F-B744-0B07BE59534F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B450984-DF81-46FE-A3E2-16323D1E55A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.3.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "6133BA76-655F-4023-A5C5-31919D3C45E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5D9FFC-728E-4E2A-9787-0748D0C88433",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8559F336-5A94-43ED-BF2E-0126038DA3C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7FE412A-DB93-41FC-85B3-38E46913BEB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "63702A32-F7D3-46FF-B7B2-A845081D3AFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF86C8A2-154B-49B3-B263-41826DC196BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CC77562-5C30-4DA3-AFCD-7CD63D85E298",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9CD71A6-724B-42C1-BBBD-456F74393909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5\\(9\\):*:*:*:*:*:*:*",
              "matchCriteriaId": "E7EDB2AB-B6EA-4327-A969-88BB822B3896",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6828C91-18F9-4E36-B496-56E559180480",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2251B20D-F0AA-4FCA-8B62-B3EED16726E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D400E92-D0E4-43C2-8ECF-84352B5B2608",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A59115E7-A5AB-4468-BE51-AB6E8D188B07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFE9D413-8078-4618-B4A6-4D774D30930F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D89BCC4B-14A8-459F-94D9-70DDB6C205F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.4.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "55E40D45-E092-4D75-BE3C-64B7AB7A1018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack.  NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms."
    },
    {
      "lang": "es",
      "value": "The Cisco Network Admission Control (NAC) 3.6.4.1 y anteriores permite a un atacante remoto prevenir la instalaci\u00f3n de Cisco Clean Access (CCA) Agent y evitar los mecanismos de protecci\u00f3n locales y remotos a trav\u00e9s de la modficaci\u00f3n de (1) la cabecera HTTP User-Agent o (2) el comportamiento de la pila TCP/IP. NOTA:el vendedor ha discutido la severidad de este asunto, indicando que los usuarios no pueden puentear los mecanismos de autentificaci\u00f3n."
    }
  ],
  "id": "CVE-2006-4430",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-08-29T00:04:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/408603/30/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/444424/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/444737/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/19726"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/408603/30/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/444424/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/444501/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/444737/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/19726"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…