CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
34.7%
Vulnerable product
Cisco ACS
Versions:
5.8.1.5 and earlier
5.8.0.8 and earlier
Link:
https://www.cisco.com/
Severity level
Severity level: Medium
Impact: Stored Cross-Site Scripting
Access Vector: Remote
CVSS v3:
Base Score: 5.4
Vector: (AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N)
CVE: CVE-2017-6769
Vulnerability description
The specialists of the Positive Research center have detected a Stored Cross-Site Scripting vulnerability in Cisco Secure ACS.
A vulnerability in the web-based management interface of the Cisco Secure Access Control System (ACS), due to insufficient input validation of user-supplied values and a lack of encoding of user-supplied data, could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of the affected system.
How to fix
Use vendorβs advisory:
<https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-acs>
Advisory status
01.06.2017 - Vendor gets vulnerability details
26.07.2017 - Vendor releases fixed version and details
13.12.2018 - Public disclosure
Credits
The vulnerability was detected by Mikhail Klyuchnikov, Positive Research Center (Positive Technologies Company)
References
<http://en.securitylab.ru/lab/PT-2018-29>
Reports on the vulnerabilities previously discovered by Positive Research:
https://www.ptsecurity.com/
<https://en.securitylab.ru/lab/>
About Positive Technologies
Positive Technologies is a leading digital security firm with over 15 years of experience in 360Β° protection of critical IT systems against the most advanced cyberthreats. State-of-the-art solutions are developed at the companyβs research centerβone of the largest in Europe. Positive Technologies experts have helped to identify and fix over 250 zero-day vulnerabilities in products from Cisco, Google, Honeywell, Huawei, Microsoft, Oracle, SAP, Schneider Electric, Siemens, and others, earning a reputation for world-class expertise in protection of devices and infrastructures at all scales from ATMs to nuclear power stations. Findings by Positive Technologies researchers are used for updating the MaxPatrol knowledge base and for development of security solutions including PT Application Firewall, PT Application Inspector, MaxPatrol. These products allow securing web applications, evaluating network protection, blocking attacks in real time, ensuring compliance with industry and national standards, and training security specialists. Positive Technologies is the organizer of the annual Positive Hack Days international forum and security competition.
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:N/I:P/A:N
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
EPSS
Percentile
34.7%