Lucene search

K
ciscoCiscoCISCO-SA-20150115-CVE-2014-8027
HistoryJan 15, 2015 - 11:05 p.m.

Cisco Secure Access Control Server Privilege Escalation Vulnerability

2015-01-1523:05:50
tools.cisco.com
14

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

EPSS

0.003

Percentile

66.3%

A vulnerability in role-based access control in Cisco Secure Access Control Server (ACS) could allow an authenticated, remote attacker to take actions with an elevated authorization level.

The vulnerability is due to improper privilege validation. An attacker could exploit the vulnerability by sending crafted HTTP requests to the Cisco ACS. An exploit could allow the attacker to perform Create, Read, Update, and Delete operations on any Network Identity Group with privileges that should be limited to the Network Device Administrator role.

Cisco has confirmed the vulnerabilities in a security notice and has released software updates.

To exploit this vulnerability, an attacker requires authenticated access to the targeted system. Authenticated access may require the attacker to access trusted, internal networks. These requirements could limit the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscosecure_access_control_systemMatchany
OR
ciscosecure_access_control_systemMatchany
VendorProductVersionCPE
ciscosecure_access_control_systemanycpe:2.3:a:cisco:secure_access_control_system:any:*:*:*:*:*:*:*

CVSS2

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:S/C:P/I:P/A:P

EPSS

0.003

Percentile

66.3%

Related for CISCO-SA-20150115-CVE-2014-8027