ID CVE-2011-0951
Summary The web-based management interface in Cisco Secure Access Control System (ACS) 5.1 before 5.1.0.44.6 and 5.2 before 5.2.0.26.3 allows remote attackers to change arbitrary user passwords via unspecified vectors, aka Bug ID CSCtl77440.
References
Vulnerable Configurations
  • cpe:2.3:a:cisco:secure_access_control_system:5.1
    cpe:2.3:a:cisco:secure_access_control_system:5.1
  • cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44
    cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44
  • cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.1
    cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.1
  • cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.2
    cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.2
  • cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.3
    cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.3
  • cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.4
    cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.4
  • cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.5
    cpe:2.3:a:cisco:secure_access_control_system:5.1.0.44.5
  • cpe:2.3:a:cisco:secure_access_control_system:5.2
    cpe:2.3:a:cisco:secure_access_control_system:5.2
  • cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26
    cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26
  • cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26.1
    cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26.1
  • cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26.2
    cpe:2.3:a:cisco:secure_access_control_system:5.2.0.26.2
CVSS
Base: 5.0 (as of 04-04-2011 - 09:57)
Impact:
Exploitability:
CWE CWE-255
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
metasploit via4
description This module exploits an authentication bypass issue which allows arbitrary password change requests to be issued for any user in the local store. Instances of Secure ACS running version 5.1 with patches 3, 4, or 5 as well as version 5.2 with either no patches or patches 1 and 2 are vulnerable.
id MSF:AUXILIARY/ADMIN/CISCO/CISCO_SECURE_ACS_BYPASS
last seen 2018-10-21
modified 2017-07-24
published 2012-05-13
reliability Normal
reporter Rapid7
source https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/admin/cisco/cisco_secure_acs_bypass.rb
title Cisco Secure ACS Unauthorized Password Change
refmap via4
bid 47093
cisco 20110330 Cisco Secure Access Control System Unauthorized Password Change Vulnerability
sectrack 1025271
secunia 43924
vupen ADV-2011-0821
xf cisco-acs-interface-security-bypass(66471)
Last major update 05-04-2011 - 00:00
Published 04-04-2011 - 08:27
Last modified 16-08-2017 - 21:33
Back to Top