

Known Affected Releases: 5.8(2.5).Ī vulnerability in the web interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to redirect a user to a malicious web page, aka an Open Redirect Vulnerability. Known Affected Releases: 5.8(0.8) 5.8(1.5).Ī vulnerability in the web interface of the Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to disclose sensitive information. Cisco Bug IDs: CSCvh25988.Ī vulnerability in the web-based management interface of the Cisco Secure Access Control System (ACS) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of the affected system. An exploit could allow the attacker to execute arbitrary commands on the device with root privileges. An attacker could exploit this vulnerability by sending a crafted serialized Java object. The vulnerability is due to insecure deserialization of user-supplied content by the affected software. Cisco Bug IDs: CSCve69037.Ī vulnerability in Java deserialization used by Cisco Secure Access Control System (ACS) prior to release 5.8 patch 9 could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected device. This vulnerability affects all releases of Cisco Secure ACS prior to Release 5.8 Patch 7. A successful exploit could allow the attacker to execute arbitrary commands on the ACS device. An attacker could exploit this vulnerability by sending a crafted AMF message that contains malicious code to a targeted user. The vulnerability is due to insufficient validation of the Action Message Format (AMF) protocol. Commands executed by the attacker are processed at the targeted user's privilege level.

A vulnerability in the ACS Report component of Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected system.
