The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Cisco Secure ACS: disclosure of passwords under Windows

Synthesis of the vulnerability 

An administrator can obtain the key used to cypher passwords of Cisco Secure ACS.
Vulnerable products: Secure ACS.
Severity of this weakness: 1/4.
Creation date: 09/05/2006.
Références of this bulletin: BID-16743, CSCsb67457, CVE-2006-0561, SYMSA-2006-003, VIGILANCE-VUL-5820.

Description of the vulnerability 

Under Windows, when Active Directory or LDAP is not used, Cisco Secure ACS 3.x stores key to decrypt passwords in registry:

However, access to this key is allowed to all members of local and remote administrative groups.

All administrators can therefore access to passwords managed by Cisco Secure ACS.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This cybersecurity note impacts software or systems such as Secure ACS.

Our Vigil@nce team determined that the severity of this computer weakness announce is low.

The trust level is of type confirmed by the editor, with an origin of user account.

An attacker with a expert ability can exploit this cybersecurity vulnerability.

Solutions for this threat 

Cisco Secure ACS: workaround.
A workaround is to limit access to following key to allowed users only:
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides an applications vulnerabilities alert. The technology watch team tracks security threats targeting the computer system.