VYPR
Unrated severityNVD Advisory· Published Feb 18, 2006· Updated Apr 16, 2026

CVE-2006-0764

CVE-2006-0764

Description

The Authentication, Authorization, and Accounting (AAA) capability in versions 5.0(1) and 5.0(3) of the software used by multiple Cisco Anomaly Detection and Mitigation products, when running with an incomplete TACACS+ configuration without a "tacacs-server host" command, allows remote attackers to bypass authentication and gain privileges, aka Bug ID CSCsd21455.

Affected products

6
  • cpe:2.3:h:cisco:anomaly_guard_module:5.0\(1\):*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:h:cisco:anomaly_guard_module:5.0\(1\):*:*:*:*:*:*:*
    • cpe:2.3:h:cisco:anomaly_guard_module:5.0\(3\):*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:guard:5.0\(1\):*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:h:cisco:guard:5.0\(1\):*:*:*:*:*:*:*
    • cpe:2.3:h:cisco:guard:5.0\(3\):*:*:*:*:*:*:*
  • cpe:2.3:h:cisco:traffic_anomaly_detector_module:5.0\(1\):*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:h:cisco:traffic_anomaly_detector_module:5.0\(1\):*:*:*:*:*:*:*
    • cpe:2.3:h:cisco:traffic_anomaly_detector_module:5.0\(3\):*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

9

News mentions

0

No linked articles in our index yet.