var-200606-0321
Vulnerability from variot
Cisco Secure Access Control Server (ACS) 4.x for Windows uses the client's IP address and the server's port number to grant access to an HTTP server port for an administration session, which allows remote attackers to bypass authentication via various methods, aka "ACS Weak Session Management Vulnerability.". This issue is due to the application's failure to properly ensure that remote web-based users are properly authenticated. This issue allows remote attackers to gain administrative access to the web-based administrative interface of the affected application. Cisco Secure ACS for Windows versions in the 4.x series were identified as vulnerable to this issue; other versions and platforms may also be affected. This issue is being tracked by Cisco Bug IDs CSCse26754 and CSCse26719. This helps attackers to hijack management sessions because port numbers are assigned in a sequential fashion without using strong authentication.
Want to join the Secunia Security Team?
Secunia offers a position as a security specialist, where your daily work involves reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports.
http://secunia.com/secunia_security_specialist/
TITLE: Cisco Secure ACS Session Management Security Issue
SECUNIA ADVISORY ID: SA20816
VERIFY ADVISORY: http://secunia.com/advisories/20816/
CRITICAL: Less critical
IMPACT: Security Bypass
WHERE:
From local network
SOFTWARE: Cisco Secure ACS 4.x http://secunia.com/product/10635/
DESCRIPTION: Darren Bounds has reported a security issue in Cisco Secure ACS, which can be exploited by malicious people to bypass certain security restrictions.
The problem is caused due to the web-based management interface handling session management in an insecure way based on the assigned service port and the client's IP address.
Successful exploitation requires that the attacker uses the same IP address as the logged in administrative user.
The security issue has been reported in version 4.0 for Windows. Other versions may also be affected.
SOLUTION: Only connect to the web-based management interface from dedicated management systems.
PROVIDED AND/OR DISCOVERED BY: Darren Bounds
ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sr-20060623-acs.shtml
Darren Bounds: http://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047301.html
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200606-0321", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "secure access control server", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "4.0.1" }, { "model": "secure access control server", "scope": "eq", "trust": 1.9, "vendor": "cisco", "version": "4.0" }, { "model": "secure access control server", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "4.x" } ], "sources": [ { "db": "BID", "id": "18621" }, { "db": "JVNDB", "id": "JVNDB-2006-004041" }, { "db": "NVD", "id": "CVE-2006-3226" }, { "db": "CNNVD", "id": "CNNVD-200606-497" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:secure_access_control_server:4.0.1:*:windows:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:secure_access_control_server:4.0:*:windows:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2006-3226" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Darren Bounds dbounds@gmail.com", "sources": [ { "db": "CNNVD", "id": "CNNVD-200606-497" } ], "trust": 0.6 }, "cve": "CVE-2006-3226", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 6.4, "integrityImpact": "PARTIAL", "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 7.5, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2006-3226", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "High", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-19334", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2006-3226", "trust": 1.8, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-200606-497", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-19334", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-19334" }, { "db": "JVNDB", "id": "JVNDB-2006-004041" }, { "db": "NVD", "id": "CVE-2006-3226" }, { "db": "CNNVD", "id": "CNNVD-200606-497" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco Secure Access Control Server (ACS) 4.x for Windows uses the client\u0027s IP address and the server\u0027s port number to grant access to an HTTP server port for an administration session, which allows remote attackers to bypass authentication via various methods, aka \"ACS Weak Session Management Vulnerability.\". This issue is due to the application\u0027s failure to properly ensure that remote web-based users are properly authenticated. \nThis issue allows remote attackers to gain administrative access to the web-based administrative interface of the affected application. \nCisco Secure ACS for Windows versions in the 4.x series were identified as vulnerable to this issue; other versions and platforms may also be affected. \nThis issue is being tracked by Cisco Bug IDs CSCse26754 and CSCse26719. This helps attackers to hijack management sessions because port numbers are assigned in a sequential fashion without using strong authentication. \n\n----------------------------------------------------------------------\n\nWant to join the Secunia Security Team?\n\nSecunia offers a position as a security specialist, where your daily\nwork involves reverse engineering of software and exploit code,\nauditing of source code, and analysis of vulnerability reports. \n\nhttp://secunia.com/secunia_security_specialist/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco Secure ACS Session Management Security Issue\n\nSECUNIA ADVISORY ID:\nSA20816\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/20816/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nSecurity Bypass\n\nWHERE:\n\u003eFrom local network\n\nSOFTWARE:\nCisco Secure ACS 4.x\nhttp://secunia.com/product/10635/\n\nDESCRIPTION:\nDarren Bounds has reported a security issue in Cisco Secure ACS,\nwhich can be exploited by malicious people to bypass certain security\nrestrictions. \n\nThe problem is caused due to the web-based management interface\nhandling session management in an insecure way based on the assigned\nservice port and the client\u0027s IP address. \n\nSuccessful exploitation requires that the attacker uses the same IP\naddress as the logged in administrative user. \n\nThe security issue has been reported in version 4.0 for Windows. \nOther versions may also be affected. \n\nSOLUTION:\nOnly connect to the web-based management interface from dedicated\nmanagement systems. \n\nPROVIDED AND/OR DISCOVERED BY:\nDarren Bounds\n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sr-20060623-acs.shtml\n\nDarren Bounds:\nhttp://lists.grok.org.uk/pipermail/full-disclosure/2006-June/047301.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2006-3226" }, { "db": "JVNDB", "id": "JVNDB-2006-004041" }, { "db": "BID", "id": "18621" }, { "db": "VULHUB", "id": "VHN-19334" }, { "db": "PACKETSTORM", "id": "47709" } ], "trust": 2.07 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2006-3226", "trust": 2.5 }, { "db": "BID", "id": "18621", "trust": 2.0 }, { "db": "SECUNIA", "id": "20816", "trust": 1.8 }, { "db": "SREASON", "id": "1157", "trust": 1.7 }, { "db": "VUPEN", "id": "ADV-2006-2524", "trust": 1.7 }, { "db": "OSVDB", "id": "26825", "trust": 1.7 }, { "db": "SECTRACK", "id": "1016369", "trust": 1.7 }, { "db": "JVNDB", "id": "JVNDB-2006-004041", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-200606-497", "trust": 0.7 }, { "db": "BUGTRAQ", "id": "20060623 RE: CISCO SECURE ACS WEAK SESSION MANAGEMENT VULNERABILITY", "trust": 0.6 }, { "db": "BUGTRAQ", "id": "20060623 CISCO SECURE ACS WEAK SESSION MANAGEMENT VULNERABILITY", "trust": 0.6 }, { "db": "CISCO", "id": "20060623 CISCO SECURE ACS WEAK SESSION MANAGEMENT VULNERABILITY", "trust": 0.6 }, { "db": "XF", "id": "27328", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-19334", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "47709", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-19334" }, { "db": "BID", "id": "18621" }, { "db": "JVNDB", "id": "JVNDB-2006-004041" }, { "db": "PACKETSTORM", "id": "47709" }, { "db": "NVD", "id": "CVE-2006-3226" }, { "db": "CNNVD", "id": "CNNVD-200606-497" } ] }, "id": "VAR-200606-0321", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-19334" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T12:23:57.908000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-acs-session-spoofing(27328)", "trust": 0.8, "url": "http://xforce.iss.net/xforce/xfdb/27328" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-004041" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2006-3226" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.7, "url": "http://www.securityfocus.com/bid/18621" }, { "trust": 1.7, "url": "http://www.cisco.com/en/us/products/sw/secursw/ps2086/tsd_products_security_response09186a00806c68f9.html" }, { "trust": 1.7, "url": "http://www.osvdb.org/26825" }, { "trust": 1.7, "url": "http://securitytracker.com/id?1016369" }, { "trust": 1.7, "url": "http://secunia.com/advisories/20816" }, { "trust": 1.7, "url": "http://securityreason.com/securityalert/1157" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/438161/100/0/threaded" }, { "trust": 1.1, "url": "http://www.securityfocus.com/archive/1/438258/100/0/threaded" }, { "trust": 1.1, "url": "http://www.vupen.com/english/advisories/2006/2524" }, { "trust": 1.1, "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27328" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-3226" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2006-3226" }, { "trust": 0.6, "url": "http://xforce.iss.net/xforce/xfdb/27328" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/438258/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/438161/100/0/threaded" }, { "trust": 0.6, "url": "http://www.frsirt.com/english/advisories/2006/2524" }, { "trust": 0.4, "url": "http://www.cisco.com/warp/public/707/cisco-sr-20060623-acs.shtml" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/sw/secursw/ps2086/index.html" }, { "trust": 0.3, "url": "/archive/1/438161" }, { "trust": 0.3, "url": "/archive/1/438258" }, { "trust": 0.1, "url": "http://secunia.com/product/10635/" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-june/047301.html" }, { "trust": 0.1, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.1, "url": "http://secunia.com/secunia_security_specialist/" }, { "trust": 0.1, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/20816/" } ], "sources": [ { "db": "VULHUB", "id": "VHN-19334" }, { "db": "BID", "id": "18621" }, { "db": "JVNDB", "id": "JVNDB-2006-004041" }, { "db": "PACKETSTORM", "id": "47709" }, { "db": "NVD", "id": "CVE-2006-3226" }, { "db": "CNNVD", "id": "CNNVD-200606-497" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-19334" }, { "db": "BID", "id": "18621" }, { "db": "JVNDB", "id": "JVNDB-2006-004041" }, { "db": "PACKETSTORM", "id": "47709" }, { "db": "NVD", "id": "CVE-2006-3226" }, { "db": "CNNVD", "id": "CNNVD-200606-497" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-06-26T00:00:00", "db": "VULHUB", "id": "VHN-19334" }, { "date": "2006-06-23T00:00:00", "db": "BID", "id": "18621" }, { "date": "2014-03-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-004041" }, { "date": "2006-06-26T22:21:41", "db": "PACKETSTORM", "id": "47709" }, { "date": "2006-06-26T16:05:00", "db": "NVD", "id": "CVE-2006-3226" }, { "date": "2006-06-26T00:00:00", "db": "CNNVD", "id": "CNNVD-200606-497" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2018-10-18T00:00:00", "db": "VULHUB", "id": "VHN-19334" }, { "date": "2006-06-26T04:50:00", "db": "BID", "id": "18621" }, { "date": "2014-03-11T00:00:00", "db": "JVNDB", "id": "JVNDB-2006-004041" }, { "date": "2018-10-18T16:46:21.047000", "db": "NVD", "id": "CVE-2006-3226" }, { "date": "2006-06-27T00:00:00", "db": "CNNVD", "id": "CNNVD-200606-497" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-200606-497" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Windows for Cisco Secure Access Control Server Vulnerabilities that bypass authentication", "sources": [ { "db": "JVNDB", "id": "JVNDB-2006-004041" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "access verification error", "sources": [ { "db": "CNNVD", "id": "CNNVD-200606-497" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.