Skip to main content

Business information leak - NAC


An organization can set its own policies for each user with NAC, it could result in too much information that sometimes overload it. On the other hand, attackers use malicious devices, they install malicious devices between a legitimate device and the switch, compromising and allowing information leakage.


  • Disrupt the NAC infrastructure to make it inaccessible.
  • Circumvent the NAC solution by using a man-in-the-middle attack.


  • Implement NAC can drastically improve an organizations network security posture.
  • A clean NAC solution can greatly increase the difficulty of a successful attack.
  • MAC-based NAC should not be used due to it is easy for a hacker to spoof a MAC address.
  • Ensure that no devices with access to the internal client network are used in publicly accessible areas.


Anonymous attacker from the Internet performing man-in-the-middle attack.

Expected Remediation Time

⌚ 60 minutes.


Default score using CVSS 3.1. It may change depending on the context of the src.


  • Attack vector: P
  • Attack complexity: L
  • Privileges required: N
  • User interaction: N
  • Scope: U
  • Confidentiality: L
  • Integrity: L
  • Availability: N


  • Exploit code madurity: X
  • Remediation level: X
  • Report confidence: X


  • Vector string: CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:X/RL:X/RC:X
  • Score:
    • Base: 3.5
    • Temporal: 3.5
  • Severity:
    • Base: Low
    • Temporal: Low

Compliant code

The NAC policy is correctly configured

config user nac-policy
Description: Configure NAC policy
edit <name>
set description {description}
set category [device]
set status [enable]
set host {string}
set user {string}

Non compliant code

The NAC policy is based on MAC

config user nac-policy
Description: Configure NAC policy
edit <name>
set description {description}
set category [device]
set status [enable]
set mac {mac-address}
set switch-mac-policy {switchPolicy}



free trial

Search for vulnerabilities in your apps for free with our automated security testing! Start your 21-day free trial and discover the benefits of our Continuous Hacking Machine Plan. If you prefer a full service that includes the expertise of our ethical hackers, don't hesitate to contact us for our Continuous Hacking Squad Plan.