The University of Portland handed a one-year suspension to engineering major and Air Force ROTC member Michael Maass after he wrote a computer program designed to replace and improve Cisco Clean Access (CCA).
Its worth mentioning here that this "vulnerability" isn't really a bug or flaw in the software, nor was this "discovery" particularly new. This is how CCA is designed to work. It keeps honest people honest. It is not "secure" against people who lie about their setup, nor could it be, without some sort of "trusted computing" system installed non-consentually on student computers that kept them from controlling the software they were running through cryptographic integrity checks controlled by the University.
RE: Student suspended for bypassing network security - News