Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco Secure Access Control System Session Fixation Web Vulnerability

Cisco-SA-20130516-CVE-2013-1200 · Medium · Published · Updated

A vulnerability in the web interface of Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to acquire the session identifier of another user's session. The vulnerability is due to the lack of session identifier regeneration. An attacker could exploit this vulnerability by capturing the existing session identifier of an authenticated user. An exploit could allow the attacker to reuse an existing user's session for access to the Cisco Secure ACS web interface. Cisco has confirmed the vulnerability in a security notice; however, software updates are not available. It is likely that an attacker would need access to a trusted, internal network in which the targeted device may reside. This access requirement decreases the likelihood of a successful exploit. Customers are advised to review the bug reports in the "Vendor Announcements" section for a current list of affected versions. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Cisco advisory · CSAF JSON

Workarounds

Administrators are advised to contact the vendor regarding future updates and releases.

Administrators are advised to allow only trusted users to have network access.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2013-1200
Cisco Bug IDsCSCud95787
CVSS ScoreBase 6.8
Base 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P/E:F/RL:U/RC:C
Product Names From Source
Cisco Secure Access Control System (ACS)

Related Products

Product CVE Evidence
Cisco Secure Access Control System (ACS) CVE-2013-1200 Cisco OpenVuln