How to Buy
This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.
The remote host is missing a vendor-supplied security patch.
The version of Cisco Secure Access Control System (ACS) running on the
remote host is affected by one or more of the following issues :
- A flaw in the authorization enforcement of the RMI
interface could allow a remote, authenticated attacker
to perform actions as superadmin. (CVE-2014-0649)
- A flaw in the authentication and authorization
enforcement of the RMI interface could allow a remote,
unauthenticated attacker to access the ACS via the RMI
interface and perform administrative actions.
- A flaw in the input validation of the web interface
could allow a remote, authenticated attacker to inject
operating system-level commands, thus performing
operating system-level commands without shell access.
See also :
Upgrade to the relevant Cisco Secure Access Control System version
referenced in Cisco Security Advisory cisco-sa-20140115-csacs.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.7
Public Exploit Available : true
Nessus Plugin ID: 71995 ()
Bugtraq ID: 649586496264964
CVE ID: CVE-2014-0648CVE-2014-0649CVE-2014-0650
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.