CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
EPSS
Percentile
43.4%
A vulnerability in Cisco Access Control Server (ACS) could allow an unauthenticated, remote attacker to perform a file inclusion attack.
The vulnerability is due to improper input validation of certain parameters passed to an affected device. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected site or allow the attacker to access sensitive browser-based information.
Cisco has confirmed the vulnerability; however, software updates are not available.
To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the link.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | secure_access_control_server_solution_engine | any | cpe:2.3:h:cisco:secure_access_control_server_solution_engine:any:*:*:*:*:*:*:* |