This script is Copyright (C) 2014 Tenable Network Security, Inc.
The remote host is missing a vendor-supplied security patch.
The version of Cisco Secure Access Control System (ACS) running on the
remote host is affected by one or more of the following issues :
- A flaw in the authorization enforcement of the RMI
interface could allow a remote, authenticated attacker
to perform actions as superadmin. (CVE-2014-0649)
- A flaw in the authentication and authorization
enforcement of the RMI interface could allow a remote,
unauthenticated attacker to access the ACS via the RMI
interface and perform administrative actions.
- A flaw in the input validation of the web interface
could allow a remote, authenticated attacker to inject
operating system-level commands, thus performing
operating system-level commands without shell access.
See also :
Upgrade to the relevant Cisco Secure Access Control System version
referenced in Cisco Security Advisory cisco-sa-20140115-csacs.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : true