Cisco Secure ACS Portal Interface Session Hijacking

This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.

Synopsis :

The remote host is missing a vendor-supplied security patch.

Description :

The version of Cisco Secure Access Control System (ACS) on the remote
host is affected by a vulnerability in the Portal Interface. Due to
insufficient session management, this could allow a remote,
authenticated attacker to perform actions in the portal with the
privileges of another user.

See also :

Solution :

Apply the Cisco Secure Access Control System patch referenced in Cisco
Bug Id CSCue65951.

Risk factor :

Medium / CVSS Base Score : 5.5
CVSS Temporal Score : 4.8
Public Exploit Available : true

Family: CISCO

Nessus Plugin ID: 72338 ()

Bugtraq ID: 65144

CVE ID: CVE-2014-0678

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now