ID CVE-2007-0057
Summary Cisco Clean Access (CCA) 3.6.x through 3.6.4.2 and 4.0.x through 4.0.3.2 does not properly configure or allow modification of a shared secret authentication key, which causes all devices to have the same shared sercet and allows remote attackers to gain unauthorized access.
References
Vulnerable Configurations
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.1.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.1.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.4.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.4.2:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:3.6.4.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.3.1:*:*:*:*:*:*:*
    cpe:2.3:a:cisco:network_admission_control_manager_and_server_system_software:4.0.3.1:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 01-11-2018 - 16:53)
Impact:
Exploitability:
CWE CWE-255
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
cisco 20070103 Multiple Vulnerabilities in Cisco Clean Access
osvdb 32578
sectrack 1017465
secunia 23617
vupen ADV-2007-0030
Last major update 01-11-2018 - 16:53
Published 04-01-2007 - 22:28
Last modified 01-11-2018 - 16:53
Back to Top