Multiple Vulnerabilities in Cisco Secure Access Control System (cisco-sa-20140115-csacs)

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote host is missing a vendor-supplied security patch.

Description :

The version of Cisco Secure Access Control System (ACS) running on the
remote host is affected by one or more of the following issues :

- A flaw in the authorization enforcement of the RMI
interface could allow a remote, authenticated attacker
to perform actions as superadmin. (CVE-2014-0649)

- A flaw in the authentication and authorization
enforcement of the RMI interface could allow a remote,
unauthenticated attacker to access the ACS via the RMI
interface and perform administrative actions.
(CVE-2014-0648)

- A flaw in the input validation of the web interface
could allow a remote, authenticated attacker to inject
operating system-level commands, thus performing
operating system-level commands without shell access.
(CVE-2014-0650)

See also :

http://www.nessus.org/u?a3eb5a2f
http://tools.cisco.com/security/center/viewAlert.x?alertId=32378
http://tools.cisco.com/security/center/viewAlert.x?alertId=32379
http://tools.cisco.com/security/center/viewAlert.x?alertId=32380

Solution :

Upgrade to the relevant Cisco Secure Access Control System version
referenced in Cisco Security Advisory cisco-sa-20140115-csacs.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.7
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 71995 ()

Bugtraq ID: 64958
64962
64964

CVE ID: CVE-2014-0648
CVE-2014-0649
CVE-2014-0650