S-267: Cisco Network Admission Control Shared Secret Vulnerability


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) S-267: Cisco Network Admission Control Shared Secret Vulnerability
# 1  
Old 04-24-2008
S-267: Cisco Network Admission Control Shared Secret Vulnerability

A vulnerability exists in the Cisco Network Admission Control (NAC) Appliance that can allow an attacker to obtain the shared secret that is used between the Cisco Clean Access Server (CAS) and the Cisco Clean Access Manager (CAM). The risk is HIGH. Successful exploitation of the vulnerability could allow an attacker to take complete control of the CAS remotely over the network.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread
Login or Register to Ask a Question
Info::CiscoRTT(3pm)					User Contributed Perl Documentation				       Info::CiscoRTT(3pm)

NAME
SNMP::Info::CiscoRTT - SNMP Interface to Cisco's Round Trip Time MIBs AUTHOR
Alexander Hartmaier SYNOPSIS
# Let SNMP::Info determine the correct subclass for you. my $rtt = new SNMP::Info( AutoSpecify => 1, Debug => 1, DestHost => 'myswitch', Community => 'public', Version => 2 ) or die "Can't connect to DestHost. "; my $class = $rtt->class(); print "SNMP::Info determined this device to fall under subclass : $class "; DESCRIPTION
SNMP::Info::CiscoRTT is a subclass of SNMP::Info that provides information about a cisco device's RTT values. Use or create in a subclass of SNMP::Info. Do not use directly. Inherited Classes none. Required MIBs CISCO-RTTMON-MIB MIBs can be found at ftp://ftp.cisco.com/pub/mibs/v2/v2.tar.gz GLOBALS
None TABLE METHODS
Overall Control Group Table This table is from "CISCO-RTTMAN-MIB::rttMonCtrlAdminTable" $rtt->rtt_desc() ("rttMonCtrlAdminOwner") Overall Control Group Table This table is from "CISCO-RTTMON-MIB::rttMonCtrl" $rtt->rtt_last() ("rttMonLatestRttOperCompletionTime") perl v5.12.4 2011-09-28 Info::CiscoRTT(3pm)