Vulnslist

Cisco vulnerabilities by product, model, software, and advisory.

Cisco Secure Access Control Server Default Tomcat Administration Interface Vulnerability

Cisco-SA-20150309-CVE-2014-2130 · Medium · Published · Updated

A vulnerability in Cisco Secure Access Control Server (ACS) may allow an authenticated, remote attacker to render the ACS web interface unreachable and to execute arbitrary code on the server with the privileges of the web server. The vulnerability is due to a default Tomcat administration web interface, which was included unintentionally. An attacker who has an ACS administrative account could exploit this vulnerability by accessing the Tomcat administration interface and modifying the ACS application files and web interface configuration. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, an attacker must authenticate to the targeted system. This access requirement decreases the likelihood of a successful exploit.

Cisco advisory · CSAF JSON

Workarounds

Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only trusted users to have network access.

Administrators are advised to allow only privileged users to access administration or management systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2014-2130
Cisco Bug IDsCSCuj83189
CVSS ScoreBase 6.5
Base 6.5 AV:N/AC:L/Au:S/C:P/I:P/A:P/E:H/RL:OF/RC:C
Product Names From Source
Cisco Secure Access Control System (ACS)

Related Products

Product CVE Evidence
Cisco Secure Access Control System (ACS) CVE-2014-2130 Cisco OpenVuln