Lucene search

K
ciscoCiscoCISCO-SA-20150514-CVE-2015-0729
HistoryMay 14, 2015 - 3:56 p.m.

Cisco Access Control Server File Inclusion Vulnerability

2015-05-1415:56:33
tools.cisco.com
20

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

43.4%

A vulnerability in Cisco Access Control Server (ACS) could allow an unauthenticated, remote attacker to perform a file inclusion attack.

The vulnerability is due to improper input validation of certain parameters passed to an affected device. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected site or allow the attacker to access sensitive browser-based information.

Cisco has confirmed the vulnerability; however, software updates are not available.

To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the link.

Affected configurations

Vulners
Node
ciscosecure_access_control_server_solution_engineMatchany
OR
ciscosecure_access_control_server_solution_engineMatchany

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

0.001 Low

EPSS

Percentile

43.4%

Related for CISCO-SA-20150514-CVE-2015-0729