

- CISCO SECURE ACCESS CONTROL SYSTEM 5.2 PATCH
- CISCO SECURE ACCESS CONTROL SYSTEM 5.2 SOFTWARE
- CISCO SECURE ACCESS CONTROL SYSTEM 5.2 CODE
Cisco Bug IDs: CSCvf66155.Ĭross-site scripting (XSS) vulnerability in the web interface in the Solution Engine in Cisco Secure Access Control Server (ACS) 5.7(0.15) allows remote attackers to inject arbitrary web script or HTML via a crafted URL. A successful exploit could allow the attacker to view sensitive information about the software, which the attacker could use to conduct additional reconnaissance attacks. An attacker could exploit this vulnerability by sending crafted HTTP requests to the web-based interface of the affected software.
CISCO SECURE ACCESS CONTROL SYSTEM 5.2 SOFTWARE
The vulnerability exists because the affected software does not sufficiently protect system software version information when the software responds to HTTP requests that are sent to the web-based interface of the software. Known Affected Releases: 5.8(2.5).Ī vulnerability in the web-based interface of Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to view sensitive information on an affected system. Known Affected Releases: 5.8(2.5).Ī vulnerability in Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to conduct a DOM-based cross-site scripting (XSS) attack against the user of the web interface of the affected system. Known Affected Releases: 5.8(2.5).Īn XML External Entity vulnerability in the web-based user interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to have read access to part of the information stored in the affected system. Known Affected Releases: 5.8(2.5).Ī vulnerability in the web interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page, aka an Open Redirect Vulnerability. Known Affected Releases: 5.8(0.8) 5.8(1.5).Ī vulnerability in the web interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to disclose sensitive information. Cisco Bug IDs: CSCvh25988.Ī vulnerability in the web-based management interface of the Cisco Secure Access Control System (ACS) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of the affected system. An exploit could allow the attacker to execute arbitrary commands on the device with root privileges. An attacker could exploit this vulnerability by sending a crafted serialized Java object. The vulnerability is due to insecure deserialization of user-supplied content by the affected software.
CISCO SECURE ACCESS CONTROL SYSTEM 5.2 PATCH
Cisco Bug IDs: CSCve69037.Ī vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) prior to release 5.8 patch 9 could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. This vulnerability affects all releases of Cisco Secure ACS prior to Release 5.8 Patch 7.

A successful exploit could allow the attacker to execute arbitrary commands on the ACS device.
CISCO SECURE ACCESS CONTROL SYSTEM 5.2 CODE
An attacker could exploit this vulnerability by sending a crafted AMF message that contains malicious code to a targeted user. The vulnerability is due to insufficient validation of the Action Message Format (AMF) protocol. Commands executed by the attacker are processed at the targeted user's privilege level. A vulnerability in the ACS Report component of Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected system.
