CVE-2005-4499
highCVSS v3 Base Score
7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS Score
1.9%
Exploitation probability in 30 days
Top 17% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Confidentiality
P
Integrity
P
Availability
P
Published: December 22, 2005 (7448 days ago)
Last Modified: April 16, 2026
Vendor: Cisco
Source: NVD
Vulnerability Report
Generated by CyberWatcher
Description
The Downloadable RADIUS ACLs feature in Cisco PIX and VPN 3000 concentrators, when creating an ACL on the Cisco Secure Access Control Server (CS ACS), generates a random internal name for an ACL that is also used as a hidden user name and password, which allows remote attackers to gain privileges by sniffing the username from the cleartext portion of a RADIUS session, then using the password to log in to another device that uses CS ACS.
CWE
NVD-CWE-OtherAffected Products
cisco vpn 3001 concentratorcisco vpn 3015 concentratorcisco vpn 3020 concentratorcisco vpn 3030 concentatorcisco vpn 3060 concentratorcisco vpn 3080 concentratorcisco adaptive security appliance softwarecisco vpn 3000 concentrator series softwarecisco vpn 3005 concentrator softwarecisco pix asa ids