![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.106451 |
Categoría: | CISCO |
Título: | Cisco Identity Services Engine Active Directory Integration Component Denial of Service Vulnerability |
Resumen: | A vulnerability in the Active Directory integration component of Cisco;Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to perform a denial of service;(DoS) attack. |
Descripción: | Summary: A vulnerability in the Active Directory integration component of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to perform a denial of service (DoS) attack. Vulnerability Insight: The vulnerability is due to improper handling of Password Authentication Protocol (PAP) authentication requests when ISE is configured with an authorization policy based on Active Directory group membership. An attacker could exploit this vulnerability by crafting a special but formally correct PAP authentication request that will trigger the issue. Vulnerability Impact: An exploit could allow the attacker to cause all subsequent authentication requests for the same Active Directory domain to fail. Affected Software/OS: Cisco Identity Services Engine software release 1.2(1.199) Solution: See the vendors advisory for solutions. CVSS Score: 5.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-9198 BugTraq ID: 94810 http://www.securityfocus.com/bid/94810 http://www.securitytracker.com/id/1037415 |
Copyright | Copyright (C) 2016 Greenbone AG |
Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |