Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco Secure ACS RMI Arbitrary File Read Vulnerability

Cisco-SA-20140116-CVE-2014-0667 · Medium · Published · Updated

A vulnerability in the Remote Method Invocation (RMI) interface of the Cisco Secure Access Control System (ACS) could allow an authenticated, remote attacker to read arbitrary files on the Cisco Secure ACS server. The vulnerability is due to insufficient authorization enforcement. An attacker could exploit this vulnerability by accessing the Cisco Secure ACS via the RMI interface. An exploit could allow the attacker to read arbitrary files located on the Cisco Secure ACS. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker must authenticate to a targeted device. This access requirement reduces the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Cisco advisory · CSAF JSON

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2014-0667
Cisco Bug IDsCSCud75169
CVSS ScoreBase 6.3
Base 6.3 AV:N/AC:M/Au:S/C:C/I:N/A:N/E:F/RL:OF/RC:C
Product Names From Source
Cisco Secure Access Control System (ACS)

Related Products

Product CVE Evidence
Cisco Secure Access Control System (ACS) CVE-2014-0667 Cisco OpenVuln