Lucene search

K
ciscoCiscoCISCO-SA-20110330-CVE-2011-0951
HistoryMar 30, 2011 - 4:24 p.m.

Cisco Secure Access Control System Password Modification Vulnerability

2011-03-3016:24:19
tools.cisco.com
15

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.015

Percentile

86.8%

Cisco Secure Access Control System (ACS) contains a vulnerability that could allow an unauthenticated, remote attacker to modify user passwords.

The vulnerability is due to improper security restrictions on user password change functions in the web-based management interface of the Cisco Secure ACS application. An unauthenticated, remote attacker could exploit this vulnerability by sending malicious requests to the system. If successful, the attacker could modify user account passwords.

Cisco has confirmed this vulnerability in a security advisory and released updated software.

To exploit this vulnerability, an attacker must be able to send malicious requests to the targeted system. Attackers may require access to internal networks to accomplish an exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscosecure_access_control_systemMatchany
OR
ciscosecure_access_control_systemMatchany
VendorProductVersionCPE
ciscosecure_access_control_systemanycpe:2.3:a:cisco:secure_access_control_system:any:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.015

Percentile

86.8%

Related for CISCO-SA-20110330-CVE-2011-0951