Description
Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username.
Published: 2004-12-01
Score: 10.0 Critical
EPSS: 2.2% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Cisco Secure Access Control Server Secure Acs Solution Engine
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-08T00:39:00.862Z

Reserved: 2004-11-30T00:00:00.000Z

Link: CVE-2004-1099

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2005-01-10T05:00:00.000

Modified: 2026-04-16T00:27:16.627

Link: CVE-2004-1099

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses