Vulnslist

find the latest Cisco vulnerabilities

Cisco Access Control Server File Inclusion Vulnerability

Cisco-SA-20150514-CVE-2015-0729 · Medium · Published · Updated

A vulnerability in Cisco Access Control Server (ACS) could allow an unauthenticated, remote attacker to perform a file inclusion attack. The vulnerability is due to improper input validation of certain parameters passed to an affected device. An attacker could exploit this vulnerability by convincing a user to follow a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected site or allow the attacker to access sensitive browser-based information. Cisco has confirmed the vulnerability; however, software updates are not available. To exploit the vulnerability, the attacker may provide a link that directs a user to a malicious site and use misleading language or instructions to persuade the user to follow the link.

Workarounds

Administrators are advised to contact the vendor regarding future updates and releases.

Users should verify that unsolicited links are safe to follow.

Administrators are advised to monitor affected systems.

CVEsCVE-2015-0729
Cisco Bug IDsCSCuu11005
CVSS ScoreBase 4.3
Base 4.3 AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:U/RC:C
Product Names From Source
Cisco Secure Access Control Server Solution Engine (ACSE)

Related Products

Product CVE Evidence
Cisco Secure Access Control Server Solution Engine (ACSE) CVE-2015-0729 Cisco OpenVuln