Cisco Secure ACS Portal Interface Session Hijacking

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a vendor-supplied security patch.

Description :

The version of Cisco Secure Access Control System (ACS) on the remote
host is affected by a vulnerability in the Portal Interface. Due to
insufficient session management, this could allow a remote,
authenticated attacker to perform actions in the portal with the
privileges of another user.

See also :

http://www.nessus.org/u?f68b9f29
http://tools.cisco.com/security/center/viewAlert.x?alertId=32567

Solution :

Apply the Cisco Secure Access Control System patch referenced in Cisco
Bug Id CSCue65951.

Risk factor :

Medium / CVSS Base Score : 5.5
(CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:N)
CVSS Temporal Score : 4.8
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 72338 ()

Bugtraq ID: 65144

CVE ID: CVE-2014-0678