{ "schema_version": "1.4.0", "id": "GHSA-m5mg-489p-j2jg", "modified": "2022-05-17T01:39:27Z", "published": "2022-05-17T01:39:27Z", "aliases": [ "CVE-2012-5424" ], "details": "Cisco Secure Access Control System (ACS) 5.x before 5.2 Patch 11 and 5.3 before 5.3 Patch 7, when a certain configuration involving TACACS+ and LDAP is used, does not properly validate passwords, which allows remote attackers to bypass authentication by sending a valid username and a crafted password string, aka Bug ID CSCuc65634.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-5424" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/79860" }, { "type": "WEB", "url": "http://osvdb.org/87251" }, { "type": "WEB", "url": "http://secunia.com/advisories/51194" }, { "type": "WEB", "url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20121107-acs" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/56433" }, { "type": "WEB", "url": "http://www.securitytracker.com/id?1027733" } ], "database_specific": { "cwe_ids": [ "CWE-20" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-11-07T23:55:00Z" } }