Lucene search

K
ciscoCiscoCISCO-SA-20130516-CVE-2013-1200
HistoryMay 16, 2013 - 3:28 p.m.

Cisco Secure Access Control System Session Fixation Web Vulnerability

2013-05-1615:28:13
tools.cisco.com
27

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.003

Percentile

70.2%

A vulnerability in the web interface of Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to acquire the session identifier of another user’s session.

The vulnerability is due to the lack of session identifier regeneration. An attacker could exploit this vulnerability by capturing the existing session identifier of an authenticated user. An exploit could allow the attacker to reuse an existing user’s session for access to the Cisco Secure ACS web interface.

Cisco has confirmed the vulnerability in a security notice; however, software updates are not available.

It is likely that an attacker would need access to a trusted, internal network in which the targeted device may reside. This access requirement decreases the likelihood of a successful exploit.

Customers are advised to review the bug reports in the “Vendor Announcements” section for a current list of affected versions.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscosecure_access_control_systemMatchany
OR
ciscosecure_access_control_systemMatchany
VendorProductVersionCPE
ciscosecure_access_control_systemanycpe:2.3:a:cisco:secure_access_control_system:any:*:*:*:*:*:*:*

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

EPSS

0.003

Percentile

70.2%

Related for CISCO-SA-20130516-CVE-2013-1200