Cisco Secure Access Control Server Multiple Vulnerabilities
IntelliShield: Security Activity Bulletin
2012 May 10 16:36 GMT
2012 May 11 14:59 GMT
IntelliShield has updated this security bulletin to correct information regarding the vulnerabilities in Cisco Secure Access Control Server.
Cisco Secure Access Control Server (ACS) versions prior to 126.96.36.199 patch 9 contain multiple vulnerabilities that could allow an unauthenticated, remote attacker to conduct cross-site request forgery attacks, disclose sensitive information, or execute arbitrary code on a targeted system.
The update fixes multiple vulnerabilities in the affected software that are due to insufficient sanitization on unspecified input. An unauthenticated, remote attacker could exploit these vulnerabilities to insert arbitrary HTML code, which could be executed in a user's browser session in the context of the affected software.
Another vulnerability that is due to the affected software's failure to perform validity checks to verify HTTP requests has also been fixed.
Reports suggest that SQL injection vulnerabilities detected by a third-party vulnerability scanner were false positives.
To exploit the vulnerabilities, the attacker may provide a link that direct a user to a malicious site or file and use misleading language or instructions to persuade the user to follow the provided link.
Cisco has released a readme file at the following link: Cisco ACS
Cisco customers with active contracts can obtain updates through the Software Center at the following link: Cisco. Cisco customers without contracts can obtain upgrades by contacting the Cisco Technical Assistance Center at 1-800-553-2447 or 1-408-526-7209 or via e-mail at email@example.com.
Version 1, May 10, 2012, 11:36 AM: Cisco Secure Access Control Server contains multiple vulnerabilities that could allow an unauthenticated, remote attacker to conduct cross-site request forgery and SQL injection attacks on a targeted system. Updates are available.
LEGAL DISCLAIMER The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.