Lucene search

K
ciscoCiscoCISCO-SA-20130611-CVE-2013-3380
HistoryJun 11, 2013 - 2:58 p.m.

Cisco Access Control Server Privilege Escalation Vulnerability

2013-06-1114:58:52
tools.cisco.com
11

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

40.5%

A vulnerability in the administrative web interface of Cisco Access Control Server could allow an authenticated, remote attacker to access the report view functions of the portal without being given the proper privileges.

The vulnerability is due to a failure to properly secure the report view page. An attacker could exploit this vulnerability by directly entering the report view URL into their browser. An exploit could allow the attacker to view potentially sensitive information that they have not be given explicit access to view.

Cisco has confirmed the vulnerability in a security notice and software updates are available.

To exploit this vulnerability, the attacker must authenticate to a targeted system. This access requirement limits the possibility of a successful exploit.

Customers are advised to review the bug report in the “Vendor Announcements” section for a current list of affected versions.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscosecure_access_control_systemMatchany
OR
ciscosecure_access_control_systemMatchany

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

0.001 Low

EPSS

Percentile

40.5%

Related for CISCO-SA-20130611-CVE-2013-3380