Cisco Secure ACS RMI Arbitrary File Read (CSCud75169)

Medium Nessus Plugin ID 72140


The remote host is missing a vendor-supplied security patch.


The version of Cisco Secure Access Control System (ACS) on the remote host is affected by a vulnerability in the Remote Method Invocation (RMI) interface. Due to insufficient authorization enforcement, this issue could allow a remote, authenticated attacker to read arbitrary files on the ACS server.


Apply the Cisco Secure Access Control System patch referenced in Cisco Bug Id CSCud75169.

See Also

Plugin Details

Severity: Medium

ID: 72140

File Name: cisco-sn-CSCud75169-csacs.nasl

Version: 1.6

Type: local

Family: CISCO

Published: 2014/01/27

Updated: 2018/11/15

Dependencies: 69133

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 6.3

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:M/Au:S/C:C/I:N/A:N

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:cisco:secure_access_control_system

Required KB Items: Host/Cisco/ACS/Version, Host/Cisco/ACS/DisplayVersion

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2014/01/16

Vulnerability Publication Date: 2014/01/16

Reference Information

CVE: CVE-2014-0667

BID: 64983