CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
EPSS
Percentile
86.8%
Cisco Secure Access Control System (ACS) contains a vulnerability that could allow an unauthenticated, remote attacker to modify user passwords.
The vulnerability is due to improper security restrictions on user password change functions in the web-based management interface of the Cisco Secure ACS application. An unauthenticated, remote attacker could exploit this vulnerability by sending malicious requests to the system. If successful, the attacker could modify user account passwords.
Cisco has confirmed this vulnerability in a security advisory and released updated software.
To exploit this vulnerability, an attacker must be able to send malicious requests to the targeted system. Attackers may require access to internal networks to accomplish an exploit.
Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | secure_access_control_system | any | cpe:2.3:a:cisco:secure_access_control_system:any:*:*:*:*:*:*:* |