A vulnerability in Cisco Access Control Server (ACS) could allow an unauthenticated, remote attacker to perform a file inclusion attack.
The vulnerability is due to improper input validation of certain parameters passed to an affected device. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected site or allow the attacker to access sensitive browser-based information.
Cisco has confirmed the vulnerability; however, software updates are not available.
To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the link.