Vulnslist

find the latest Cisco vulnerabilities

Cisco Secure Access Control Server Role-Based Access Control Weak Protection Vulnerability

cisco-sa-20151023-acs_rbac1 · Medium · Published · Updated

A vulnerability in the role-based access control (RBAC) implementation of the Cisco Secure Access Control Server (ACS) could allow an authenticated, remote attacker to view system administrator reports and status.   The vulnerability is due to improper RBAC validation when a user accesses the report generation web interface. An attacker could exploit this vulnerability by authenticating as a non-privileged user and navigating to what should be a restricted web page. A successful exploit could allow the attacker to view confidential report and status information about the affected device, including IP addresses and usernames. Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20151023-acs_rbac1

Workarounds

Workarounds are not available.

CVEsCVE-2015-6348
Cisco Bug IDsCSCuw24661
CVSS ScoreBase 4.0
Base 4.0 AV:N/AC:L/Au:S/C:P/I:N/A:N/E:F/RL:U/RC:C
Product Names From Source
Cisco Secure Access Control Server Solution Engine (ACSE)

CSAF Product Statuses

Product Status Source CVE Rows
Cisco Secure Access Control Server Solution Engine (ACSE) known_affected cisco_csaf CVE-2015-6348 1

Related Products

Product CVE Evidence
Cisco Secure Access Control Server Solution Engine (ACSE) CVE-2015-6348 Cisco OpenVuln