Cisco Access Control Server File Inclusion Vulnerability

ID CISCO-SA-20150514-CVE-2015-0729
Type cisco
Reporter Cisco
Modified 2015-05-14T15:56:23


A vulnerability in Cisco Access Control Server (ACS) could allow an unauthenticated, remote attacker to perform a file inclusion attack.

The vulnerability is due to improper input validation of certain parameters passed to an affected device. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected site or allow the attacker to access sensitive browser-based information.

Cisco has confirmed the vulnerability; however, software updates are not available.

To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the link.