Unrated severityNVD Advisory· Published Jan 10, 2005· Updated Apr 16, 2026
CVE-2004-1099
CVE-2004-1099
Description
Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username.
Affected products
3cpe:2.3:a:cisco:secure_access_control_server:3.3.1:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:cisco:secure_access_control_server:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_access_control_server:3.3\(1\):*:*:*:*:*:*:*
- cpe:2.3:a:cisco:secure_acs_solution_engine:*:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- www.ciac.org/ciac/bulletins/p-028.shtmlnvdPatchVendor Advisory
- www.securityfocus.com/bid/11577nvdPatchVendor Advisory
- www.cisco.com/warp/public/707/cisco-sa-20041102-acs-eap-tls.shtmlnvdVendor Advisory
- exchange.xforce.ibmcloud.com/vulnerabilities/17936nvd
News mentions
0No linked articles in our index yet.