Lucene search

K
ciscoCiscoCISCO-SA-20140116-CVE-2014-0667
HistoryJan 16, 2014 - 7:18 p.m.

Cisco Secure ACS RMI Arbitrary File Read Vulnerability

2014-01-1619:18:55
tools.cisco.com
10

CVSS2

6.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:C/I:N/A:N

EPSS

0.002

Percentile

64.8%

A vulnerability in the Remote Method Invocation (RMI) interface of the Cisco Secure Access Control System (ACS) could allow an authenticated, remote attacker to read arbitrary files on the Cisco Secure ACS server.

The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by accessing the Cisco Secure ACS via the RMI interface. An exploit could allow the attacker to read arbitrary files located on the Cisco Secure ACS.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, an attacker must authenticate to a targeted device. This access requirement reduces the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscosecure_access_control_systemMatchany
OR
ciscosecure_access_control_systemMatchany
VendorProductVersionCPE
ciscosecure_access_control_systemanycpe:2.3:a:cisco:secure_access_control_system:any:*:*:*:*:*:*:*

CVSS2

6.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:S/C:C/I:N/A:N

EPSS

0.002

Percentile

64.8%

Related for CISCO-SA-20140116-CVE-2014-0667