Guest

Preview Tool

Cisco Bug: CSCuq79034 - ACS Authorization Bypass

Last Modified

Feb 22, 2018

Products (1)

  • Cisco Secure Access Control Server Solution Engine

Known Affected Releases

5.5(0.46.4)

Description (partial)

Symptom:
A vulnerability in the Role Based Access Control component of Cisco Access Control Server (ACS) could allow an authenticated, remote attacker to exceed its authorization level. The vulnerability is due to improper privilege validation. An attacker could exploit this vulnerability by sending crafted HTTP request to the ACS server. An exploit could allow the attacker to do Create, Read, Update and Delete operations on any Network Identity Group with privileges limited to a Network Device Administrator.

Conditions:
Cisco Secure ACS running release 5.5 without patch 7 or Cisco ACS running release 5.6 without patch 2.

Related Community Discussions

benefits of Cisco ACS 5.7
Hi Everyone, I am currently using Cisco ACS 5.4 with patch 7  only to manage users logging into network devices (i.e. TACACS+ and radius).  Cisco just releases 5.7 on May 12th.  Any benefits to upgrade from 5.4 patch 7 to ACS 5.7? on the release notes, I see this on 5.7:  Maximum Failed Attempts Count Policy  New Sub-Attributes for Service Type RADIUS IETF Attribute  Supporting SNMP Traps for Monitoring Disk Utilization  Log Message for CLI Administrator Account Locked Out  Establishing New Connection ...
Latest activity: May 20, 2015
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.

Bug Details Include

  • Full Description (including symptoms, conditions and workarounds)
  • Status
  • Severity
  • Known Fixed Releases
  • Related Community Discussions
  • Number of Related Support Cases
Bug information is viewable for customers and partners who have a service contract. Registered users can view up to 200 bugs per month without a service contract.