Cisco Secure Access Control System Remote Code Execution Vulnerability
by CIRT Team
Description: A vulnerability in the ACS Report component of Cisco Secure Access Control System (ACS) could allow an unauthenticated, remote attacker to execute arbitrary commands on an affected system. Commands executed by the attacker are processed at the targeted user’s privilege level.
The vulnerability is due to insufficient validation of the Action Message Format (AMF) protocol. An attacker could exploit this vulnerability by sending a crafted AMF message that contains malicious code to a targeted user. A successful exploit could allow the attacker to execute arbitrary commands on the ACS device.
Impact: Remote code execution.
Vulnerable Products
This vulnerability affects all releases of Cisco Secure ACS prior to Release 5.8 Patch 7.
Mitigation: Cisco has released software updates that address this vulnerability. Please see the references or vendor advisory for more information.
Reference URL’s:
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180502-acs1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0253
Recommended Posts
Active Exploitation of Critical F5 BIG – IP Vulnerability (CVE–2023-46747) Uncovered in Bangladesh
06 Nov 2024 - Security Advisories & Alerts