A vulnerability in the web interface of Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to acquire the session identifier of another user's session.
The vulnerability is due to the lack of session identifier regeneration. An attacker could exploit this vulnerability by capturing the existing session identifier of an authenticated user. An exploit could allow the attacker to reuse an existing user's session for access to the Cisco Secure ACS web interface.
Cisco has confirmed the vulnerability in a security notice; however, software updates are not available.
It is likely that an attacker would need access to a trusted, internal network in which the targeted device may reside. This access requirement decreases the likelihood of a successful exploit.
Customers are advised to review the bug reports in the "Vendor Announcements" section for a current list of affected versions.
Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.