CVE-2006-4430

critical

Description

The Cisco Network Admission Control (NAC) 3.6.4.1 and earlier allows remote attackers to prevent installation of the Cisco Clean Access (CCA) Agent and bypass local and remote protection mechanisms by modifying (1) the HTTP User-Agent header or (2) the behavior of the TCP/IP stack. NOTE: the vendor has disputed the severity of this issue, stating that users cannot bypass authentication mechanisms.

References

http://www.securityfocus.com/bid/19726

http://www.securityfocus.com/archive/1/444737/100/0/threaded

http://www.securityfocus.com/archive/1/444501/100/0/threaded

http://www.securityfocus.com/archive/1/444424/100/0/threaded

http://www.securityfocus.com/archive/1/408603/30/0/threaded

http://www.cisco.com/en/US/products/ps6128/tsd_products_security_response09186a008071d609.html

http://www.cisco.com/en/US/products/ps6128/products_security_notice09186a00804fa82b.html

http://archive.cert.uni-stuttgart.de/archive/bugtraq/2005/08/msg00200.html

Details

Source: Mitre, NVD

Published: 2006-08-29

Updated: 2026-04-16

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical

EPSS

EPSS: 0.01199