Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco Secure Access Control Server Open Redirect Vulnerability

Cisco-SA-20150112-CVE-2014-8029 · Medium · Published · Updated

A vulnerability in the web interface of Cisco Secure Access Control Server (ACS) could allow an unauthenticated, remote attacker to conduct a web page open redirection attack against a user's browser. The vulnerability is due to insufficient input validation of a specific parameter. An attacker could exploit this vulnerability by persuading a user to access a malicious link. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker may require access to trusted, internal networks to send crafted requests to the affected software. This access requirement could limit the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Cisco advisory · CSAF JSON

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2014-8029
Cisco Bug IDsCSCuq74150
CVSS ScoreBase 4.3
Base 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N/E:F/RL:OF/RC:C
Product Names From Source
Cisco Secure Access Control System (ACS)

Related Products

Product CVE Evidence
Cisco Secure Access Control System (ACS) CVE-2014-8029 Cisco OpenVuln